libssh2 输入验证错误漏洞

admin 2024-01-13 21:22:35 YS 来源:ZONE.CI 全球网 0 阅读模式
> libssh2 输入验证错误漏洞

libssh2 输入验证错误漏洞

CNNVD-ID编号 CNNVD-201910-1276 CVE编号 CVE-2019-17498
发布时间 2019-10-21 更新时间 2021-02-04
漏洞类型 输入验证错误 漏洞来源 N/A
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

libssh2是一款实现SSH2协议的客户端C库,它能够执行远程命令、文件传输,同时为远程的程序提供安全的传输通道。

libssh2 1.9.0及之前版本中的packet.c文件的SSH_MSG_DISCONNECT逻辑存在输入验证错误漏洞。攻击者可借助特制的SSH服务器利用该漏洞泄露敏感信息或造成拒绝服务。

漏洞补丁

目前厂商已发布升级了libssh2 输入验证错误漏洞的补丁,libssh2 输入验证错误漏洞的补丁获取链接:

参考网址

来源:github.com

链接:https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94

来源:github.com

链接:https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480

来源:github.com

链接:https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498

来源:blog.semmle.com

链接:https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/

来源:MISC

链接:https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html

来源:security-tracker.debian.org

链接:https://security-tracker.debian.org/tracker/DLA-1991-1

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192900-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914206-1.html

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/libssh2-out-of-bounds-memory-reading-via-SSH-MSG-DISCONNECT-30797

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3535/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-have-been-identified-in-bigfix-platform-shipped-with-ibm-license-metric-tool/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affected-by-a-libssh2-vulnerability-cve-2019-17498/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159553/Red-Hat-Security-Advisory-2020-4255-01.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-libssh2-cve-2019-17498/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4226/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4181/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4281/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-5/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0319/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4461/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4223/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159661/Red-Hat-Security-Advisory-2020-4264-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3365/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159358/Red-Hat-Security-Advisory-2020-3915-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3631/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201910-1276

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0