libssh2-1.4.2-3.AXS4.1

エラータID: AXSA:2019-3922:01

Release date: 
Tuesday, July 2, 2019 - 12:49
Subject: 
libssh2-1.4.2-3.AXS4.1
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The libssh2 packages provide a library that implements the SSH2 protocol.

Security Fix(es):

* libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855)

* libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856)

* libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857)

* libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2019-3855
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3856
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3857
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3863
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. libssh2-1.4.2-3.AXS4.1.src.rpm
    MD5: 80903a5928b27079a3d0102efc693adf
    SHA-256: 3c3819f1c9d0d8fea8587e74946ebeb7a7e0362fc3f637b613ab9027c8066b5f
    Size: 680.62 kB

Asianux Server 4 for x86
  1. libssh2-1.4.2-3.AXS4.1.i686.rpm
    MD5: e005861e52c46f344115999e92f118ee
    SHA-256: e5b22250adb141715392c4d6f24bf82d0d136dfac75ba438db1c0f94a487cb07
    Size: 124.18 kB

Asianux Server 4 for x86_64
  1. libssh2-1.4.2-3.AXS4.1.x86_64.rpm
    MD5: 1fd833ba62e6e51b84b7474b00f1010c
    SHA-256: 404e1bedf5e9e301bde88351b3645c4d551c72ac6135efc4c5f072baff3baf12
    Size: 122.46 kB
  2. libssh2-1.4.2-3.AXS4.1.i686.rpm
    MD5: e005861e52c46f344115999e92f118ee
    SHA-256: e5b22250adb141715392c4d6f24bf82d0d136dfac75ba438db1c0f94a487cb07
    Size: 124.18 kB