libssh2 输入验证错误漏洞
CNNVD-ID编号 | CNNVD-201910-1276 | CVE编号 | CVE-2019-17498 |
发布时间 | 2019-10-21 | 更新时间 | 2021-02-04 |
漏洞类型 | 输入验证错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
libssh2是一款实现SSH2协议的客户端C库,它能够执行远程命令、文件传输,同时为远程的程序提供安全的传输通道。
libssh2 1.9.0及之前版本中的packet.c文件的SSH_MSG_DISCONNECT逻辑存在输入验证错误漏洞。攻击者可借助特制的SSH服务器利用该漏洞泄露敏感信息或造成拒绝服务。
漏洞补丁
目前厂商已发布升级了libssh2 输入验证错误漏洞的补丁,libssh2 输入验证错误漏洞的补丁获取链接:
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
参考网址
来源:github.com
链接:https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
来源:github.com
链接:https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
来源:github.com
来源:blog.semmle.com
链接:https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
来源:FEDORA
来源:FEDORA
来源:MISC
链接:https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html
来源:security-tracker.debian.org
链接:https://security-tracker.debian.org/tracker/DLA-1991-1
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192900-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914206-1.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/libssh2-out-of-bounds-memory-reading-via-SSH-MSG-DISCONNECT-30797
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3535/
来源:www.ibm.com
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159553/Red-Hat-Security-Advisory-2020-4255-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-libssh2-cve-2019-17498/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4226/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4181/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4281/
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0319/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4461/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4223/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159661/Red-Hat-Security-Advisory-2020-4264-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3365/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159358/Red-Hat-Security-Advisory-2020-3915-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3631/
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201910-1276

评论