vulnerability
FreeBSD: VID-6e58e1e9-2636-413e-9f84-4c0e21143628 (CVE-2019-3858): libssh2 -- multiple issues
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Apr 18, 2019 | Apr 19, 2019 | Dec 10, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Apr 18, 2019
Added
Apr 19, 2019
Modified
Dec 10, 2025
Description
libssh2 developers report: Defend against possible integer overflows in comp_method_zlib_decomp. Defend against writing beyond the end of the payload in _libssh2_transport_read(). Sanitize padding_length - _libssh2_transport_read(). This prevents an underflow resulting in a potential out-of-bounds read if a server sends a too-large padding_length, possibly with malicious intent. Prevent zero-byte allocation in sftp_packet_read() which could lead to an out-of-bounds read. Check the length of data passed to sftp_packet_add() to prevent out-of-bounds reads. Add a required_size parameter to sftp_packet_require et. al. to require callers of these functions to handle packets that are too short. Additional length checks to prevent out-of-bounds reads and writes in _libssh2_packet_add().
Solutions
freebsd-upgrade-package-libssh2freebsd-upgrade-package-linux-c6-libssh2freebsd-upgrade-package-linux-c7-libssh2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.