Lucene search

K
rosalinuxROSA LABROSA-SA-2021-1893
HistoryJul 02, 2021 - 5:17 p.m.

Advisory ROSA-SA-2021-1893

2021-07-0217:17:12
ROSA LAB
abf.rosalinux.ru
8

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

7.6 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.046 Low

EPSS

Percentile

92.5%

Software: libssh2 1.8.0
OS: Cobalt 7.9

CVE-ID: CVE-2019-13115
CVE-Crit: HIGH
CVE-DESC: In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that can cause out-of-range reads when reading packets from the server. A remote attacker compromising the SSH server could reveal sensitive information or cause a denial of service on the client system when a user connects to the server. This is related to the _libssh2_check_length bug and is different from various issues fixed in 1.8.1, such as CVE-2019-3855.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2019-3860
CVE-Crit: CRITICAL
CVE-DESC: libssh2 before 1.8.1 had an out-of-range read error in the way SFTP packets with empty payload data were analyzed. A remote attacker compromising an SSH server could cause a denial of service or read data in client memory.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2019-3859
CVE-Crit: CRITICAL
CVE-DESC: An out-of-bounds read error was detected in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker compromising an SSH server can cause a denial of service or read data in client memory.
CVE-STATUS: default
CVE-REV: Default

OSVersionArchitecturePackageVersionFilename
Cobaltanynoarchlibssh2< 1.8.0UNKNOWN

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

7.6 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.046 Low

EPSS

Percentile

92.5%