Description
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
Published: 2019-07-16
Score: 8.1 High
EPSS: 42.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1730-3 libssh2 regression update
Debian DLA Debian DLA DLA-2848-1 libssh2 security update
Debian DLA Debian DLA DLA-3559-1 libssh2 security update
Ubuntu USN Ubuntu USN USN-5308-1 libssh2 vulnerabilities
History

No history.

Subscriptions

Debian Debian Linux
F5 Traffix Systems Signaling Delivery Controller
Fedoraproject Fedora
Libssh2 Libssh2
Netapp Cloud Backup E-series Santricity Os Controller Ontap Select Deploy Administration Utility
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:41:10.457Z

Reserved: 2019-06-30T00:00:00.000Z

Link: CVE-2019-13115

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-16T18:15:13.287

Modified: 2024-11-21T04:24:13.313

Link: CVE-2019-13115

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-07-16T00:00:00Z

Links: CVE-2019-13115 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses