Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2019-3860
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.008
EPSS Ranking
73.3%
CVSS Severity
CVSS v3 Score
5.0
CVSS v2 Score
6.4
References
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://seclists.org/bugtraq/2019/Apr/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3860.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://seclists.org/bugtraq/2019/Apr/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3860.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Products affected by CVE-2019-3860
Libssh2
»
Libssh2
»
Version:
0.10
cpe:2.3:a:libssh2:libssh2:0.10
Libssh2
»
Libssh2
»
Version:
0.11
cpe:2.3:a:libssh2:libssh2:0.11
Libssh2
»
Libssh2
»
Version:
0.12
cpe:2.3:a:libssh2:libssh2:0.12
Libssh2
»
Libssh2
»
Version:
0.13
cpe:2.3:a:libssh2:libssh2:0.13
Libssh2
»
Libssh2
»
Version:
0.14
cpe:2.3:a:libssh2:libssh2:0.14
Libssh2
»
Libssh2
»
Version:
0.15
cpe:2.3:a:libssh2:libssh2:0.15
Libssh2
»
Libssh2
»
Version:
0.16
cpe:2.3:a:libssh2:libssh2:0.16
Libssh2
»
Libssh2
»
Version:
0.17
cpe:2.3:a:libssh2:libssh2:0.17
Libssh2
»
Libssh2
»
Version:
0.18
cpe:2.3:a:libssh2:libssh2:0.18
Libssh2
»
Libssh2
»
Version:
0.3
cpe:2.3:a:libssh2:libssh2:0.3
Libssh2
»
Libssh2
»
Version:
0.5
cpe:2.3:a:libssh2:libssh2:0.5
Libssh2
»
Libssh2
»
Version:
0.6
cpe:2.3:a:libssh2:libssh2:0.6
Libssh2
»
Libssh2
»
Version:
0.7
cpe:2.3:a:libssh2:libssh2:0.7
Libssh2
»
Libssh2
»
Version:
0.8
cpe:2.3:a:libssh2:libssh2:0.8
Libssh2
»
Libssh2
»
Version:
1.0
cpe:2.3:a:libssh2:libssh2:1.0
Libssh2
»
Libssh2
»
Version:
1.1
cpe:2.3:a:libssh2:libssh2:1.1
Libssh2
»
Libssh2
»
Version:
1.2
cpe:2.3:a:libssh2:libssh2:1.2
Libssh2
»
Libssh2
»
Version:
1.2.1
cpe:2.3:a:libssh2:libssh2:1.2.1
Libssh2
»
Libssh2
»
Version:
1.2.2
cpe:2.3:a:libssh2:libssh2:1.2.2
Libssh2
»
Libssh2
»
Version:
1.2.3
cpe:2.3:a:libssh2:libssh2:1.2.3
Libssh2
»
Libssh2
»
Version:
1.2.4
cpe:2.3:a:libssh2:libssh2:1.2.4
Libssh2
»
Libssh2
»
Version:
1.2.5
cpe:2.3:a:libssh2:libssh2:1.2.5
Libssh2
»
Libssh2
»
Version:
1.2.6
cpe:2.3:a:libssh2:libssh2:1.2.6
Libssh2
»
Libssh2
»
Version:
1.2.7
cpe:2.3:a:libssh2:libssh2:1.2.7
Libssh2
»
Libssh2
»
Version:
1.2.8
cpe:2.3:a:libssh2:libssh2:1.2.8
Libssh2
»
Libssh2
»
Version:
1.2.9
cpe:2.3:a:libssh2:libssh2:1.2.9
Libssh2
»
Libssh2
»
Version:
1.3.0
cpe:2.3:a:libssh2:libssh2:1.3.0
Libssh2
»
Libssh2
»
Version:
1.4.0
cpe:2.3:a:libssh2:libssh2:1.4.0
Libssh2
»
Libssh2
»
Version:
1.4.1
cpe:2.3:a:libssh2:libssh2:1.4.1
Libssh2
»
Libssh2
»
Version:
1.4.2
cpe:2.3:a:libssh2:libssh2:1.4.2
Libssh2
»
Libssh2
»
Version:
1.4.3
cpe:2.3:a:libssh2:libssh2:1.4.3
Libssh2
»
Libssh2
»
Version:
1.5.0
cpe:2.3:a:libssh2:libssh2:1.5.0
Libssh2
»
Libssh2
»
Version:
1.6.0
cpe:2.3:a:libssh2:libssh2:1.6.0
Libssh2
»
Libssh2
»
Version:
1.7.0
cpe:2.3:a:libssh2:libssh2:1.7.0
Libssh2
»
Libssh2
»
Version:
1.8.0
cpe:2.3:a:libssh2:libssh2:1.8.0
Netapp
»
Ontap Select Deploy Administration Utility
»
Version:
N/A
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Opensuse
»
Leap
»
Version:
15.0
cpe:2.3:o:opensuse:leap:15.0
Opensuse
»
Leap
»
Version:
42.3
cpe:2.3:o:opensuse:leap:42.3
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved