Bug 1687305 (CVE-2019-3857)
Summary: | CVE-2019-3857 libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | bmcclain, dblechte, dfediuck, djuran, eedri, erik-fedora, kdudka, mgoldboi, michal.skrivanek, mike, paul, rjones, rschiron, sbonazzo, security-response-team, sherold, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libssh2 1.8.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:50:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1688181, 1688182, 1688426, 1688427, 1690247, 1690248, 1690408, 1694993, 1696058, 1697684, 1697694, 1714650, 1719437, 1719438, 1724837 | ||
Bug Blocks: | 1687317 |
Description
Andrej Nemec
2019-03-11 08:55:00 UTC
Acknowledgments: Name: the libssh2 project Upstream: Chris Coulson (Canonical Ltd.) Function _libssh2_packet_add() in packet.c does not properly check the namelen value of a SSH_MSG_CHANNEL_REQUEST message, with an exit signal. The value could overflow and is used to allocate memory later on. The attacker needs to: - trick the user to connect to a malicious server or - trick the user to connect to a compromised server or - intercept and modify the traffic For these reasons User Interaction (UI) is set to Required(R) and Attack Complexity (AC) is set to High (H). Statement: This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers. Reference: https://www.openwall.com/lists/oss-security/2019/03/18/3 Upstream Patch: https://libssh2.org/1.8.0-CVE/CVE-2019-3857.patch External References: https://www.libssh2.org/CVE-2019-3857.html Created libssh tracking bugs for this issue: Affects: fedora-all [bug 1690246] Created mingw-libssh2 tracking bugs for this issue: Affects: fedora-all [bug 1690247] Created mingw-libssh2 tracking bugs for this issue: Affects: epel-7 [bug 1690248] Created libssh2 tracking bugs for this issue: Affects: fedora-all [bug 1690408] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0679 https://access.redhat.com/errata/RHSA-2019:0679 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1175 https://access.redhat.com/errata/RHSA-2019:1175 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1652 https://access.redhat.com/errata/RHSA-2019:1652 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:1791 https://access.redhat.com/errata/RHSA-2019:1791 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2019:1943 https://access.redhat.com/errata/RHSA-2019:1943 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Red Hat Enterprise Linux 7.3 Telco Extended Update Support Via RHSA-2019:2399 https://access.redhat.com/errata/RHSA-2019:2399 |