CVE编号
CVE-2019-13115利用情况
暂无补丁情况
官方补丁披露时间
2019-07-17漏洞描述
在1.9.0之前的libssh2中,kex.c中的kex_method_diffie_hellman_group_exchange_sha256_key_exchange具有整数溢出,这可能导致从服务器读取数据包的方式读取越界。当用户连接到服务器时,攻击SSH服务器的远程攻击者可能能够在客户端系统上泄露敏感信息或导致拒绝服务条件。这与_libssh2_check_length错误有关,与1.8.1中修复的各种问题不同,例如CVE-2019-3855。<br>解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://libssh2.org/changes.html
参考链接 |
|
---|---|
https://blog.semmle.com/libssh2-integer-overflow/ | |
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa | |
https://github.com/libssh2/libssh2/pull/350 | |
https://libssh2.org/changes.html | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db560... | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61... | |
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html | |
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://security.netapp.com/advisory/ntap-20190806-0002/ | |
https://support.f5.com/csp/article/K13322484 | |
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | libssh2 | libssh2 | * |
Up to (excluding) 1.9.0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | libssh2 | * |
Up to (excluding) 1.9.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | libssh2 | * |
Up to (excluding) 1.8.0-2.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | libssh2 | * |
Up to (excluding) 1.8.0-2.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | libssh2 | * |
Up to (excluding) 1.4.3-4.1+deb8u4 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | libssh2 | * |
Up to (excluding) 1.7.0-1+deb9u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | libssh2 | * |
Up to (excluding) 1.8.0-2.1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | libssh2 | * |
Up to (excluding) 1.9.0-1.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | libssh2 | * |
Up to (excluding) 1.9.0-1.fc30 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...