In libssh2 v1.9.0 and earlier versions, the SSHMSGDISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "8.0"
},
{
"last_affected": "9.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
],
"vendor_product": "fedoraproject:fedora",
"extracted_events": [
{
"last_affected": "30"
},
{
"last_affected": "31"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*"
],
"vendor_product": "libssh2:libssh2",
"extracted_events": [
{
"last_affected": "1.9.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
],
"vendor_product": "opensuse:leap",
"extracted_events": [
{
"last_affected": "15.1"
}
]
}
]
}