libssh2-1.4.3-12.el7.2
エラータID: AXSA:2019-3791:02
リリース日:
2019/04/03 Wednesday - 13:07
題名:
libssh2-1.4.3-12.el7.2
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- libssh2には、サーバーからのパケットの読み込みに境界外書き込みを引き起こす整数
オーバーフローがあり、リモートの攻撃者がユーザーが SSHサーバーに繋いでいる際、クライ
アントシステムで任意のコードを実行させることが可能な脆弱性があります。
(CVE-2019-3855)
- libssh2には、キーボードプロンプトリクエストの解析に境界外書き込みを引き起こす整数
オーバーフローがあり、リモートの攻撃者がユーザーが SSHサーバーに繋いでいる際、クライ
アントシステムで任意のコードを実行させることが可能な脆弱性があります。
(CVE-2019-3856)
- libssh2には、SSH_MSG_CHANNEL_REQUESTを含むパケットをEXITシグナルと一緒に
解析するときに、境界外書き込みを引き起こす整数オーバーフローがあり、リモートの攻撃者
がユーザーがSSHサーバーに繋いでいる際、クライアントシステムで、任意のコードを実行
させることが可能な脆弱性があります。 (CVE-2019-3857)
- libssh2には、サーバーが複数のインタラクティブなキーボードレスポンスメッセージの合
計長を符号無しcharの最大値を越えて送ることが可能なため、境域外メモリ書き込みを引き
起こしてしまう脆弱性があります。(CVE-2019-3863)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2019-3855
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3856
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3857
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3863
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
追加情報:
N/A
ダウンロード:
SRPMS
- libssh2-1.4.3-12.el7.2.src.rpm
MD5: 38879995ced81998062e0d8de512a110
SHA-256: 8e9a8d5840460cba360ebd6e66d734b6db5d839be2f136008e7655a3b99f5182
Size: 709.14 kB
Asianux Server 7 for x86_64
- libssh2-1.4.3-12.el7.2.x86_64.rpm
MD5: 680788a9aa984d5ce285e80230965c8e
SHA-256: 25a1130e1fc237a7b72b6f41e3a8790a9c7861589813e5484c4a53c730b49dcc
Size: 133.62 kB - libssh2-1.4.3-12.el7.2.i686.rpm
MD5: 8e8ef170747efdbe3efa71af6045ca6c
SHA-256: f6ceb77c7bd6123464d53f4b0891887991839bb16343ce81c8155afc2ff9d436
Size: 133.14 kB