BDU:2019-03898
Vulnerability from fstec - Published: 03.12.2018
VLAI Severity ?
Title
Уязвимость библиотеки libssh2, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость библиотеки libssh2 связана с целочисленным переполнением. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить произвольный код путем подключения к SSH-серверу
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения, Novell Inc., Fedora Project, ООО «РусБИТех-Астра»
Software Name
Red Hat Enterprise Linux, Debian GNU/Linux, OpenSUSE Leap, Fedora, Astra Linux Special Edition (запись в едином реестре российских программ №369), libssh2, Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156)
Software Version
Server 6 (Red Hat Enterprise Linux), Desktop 6 (Red Hat Enterprise Linux), Workstation 6 (Red Hat Enterprise Linux), Desktop 7 (Red Hat Enterprise Linux), Workstation 7 (Red Hat Enterprise Linux), Server 7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 28 (Fedora), 1.6 «Смоленск» (Astra Linux Special Edition), 29 (Fedora), Server AUS 7.6 (Red Hat Enterprise Linux), Server TUS 7.6 (Red Hat Enterprise Linux), 15.0 (OpenSUSE Leap), 30 (Fedora), for Scientific Computing 7 (Red Hat Enterprise Linux), for Power, little endian - Extended Update Supp 7.5 (Red Hat Enterprise Linux), for Power, big endian - Extended Update Support 7.5 (Red Hat Enterprise Linux), for IBM z Systems - Extended Update Support 7.5 (Red Hat Enterprise Linux), for IBM z Systems 7 (Red Hat Enterprise Linux), for ARM 64 7 (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), до 1.8.1 (libssh2), for Power, big endian - Extended Update Support 7.6 (Red Hat Enterprise Linux), for Power, little endian - Extended Update Support 7.6 (Red Hat Enterprise Linux), for IBM z Systems - Extended Update Support 7.6 (Red Hat Enterprise Linux), Server- Update Services for SAP Solutions 7.3 (Red Hat Enterprise Linux), Server- Update Services for SAP Solutions 7.4 (Red Hat Enterprise Linux), Server- Update Services for SAP Solutions 7.6 (Red Hat Enterprise Linux), for Scientific Computing 6 (Red Hat Enterprise Linux), Server - AUS 7.4 (Red Hat Enterprise Linux), Server - TUS 7.4 (Red Hat Enterprise Linux), Server - EUS 7.4 (Red Hat Enterprise Linux), for Power, little endian - Extended Update Support 7.4 (Red Hat Enterprise Linux), for Power, big endian - Extended Update Support 7.4 (Red Hat Enterprise Linux), for IBM z Systems - Extended Update Support 7.4 (Red Hat Enterprise Linux), Server - AUS 7.3 (Red Hat Enterprise Linux), Server - TUS 7.3 (Red Hat Enterprise Linux), 8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»)
Possible Mitigations
Использование рекомендаций:
Для libssh2:
https://www.libssh2.org/CVE-2019-3855.html
Для программных продуктов Novell Inc.:
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
Для программных продуктов Red Hat Inc.:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855
Для Debian GNU/Linux:
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Для программных продуктов Fedora Project:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
Для Astra Linux использование рекомендаций, приведенных в бюллетенях № 20190912SE16 и № 20191225SE81:
https://wiki.astralinux.ru/pages/viewpage.action?pageId=57444186
https://wiki.astralinux.ru/pages/viewpage.action?pageId=67111271
Reference
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
http://seclists.org/fulldisclosure/2019/Sep/42
http://www.openwall.com/lists/oss-security/2019/03/18/3
http://www.securityfocus.com/bid/107485
https://access.redhat.com/errata/RHSA-2019:0679
https://access.redhat.com/errata/RHSA-2019:1175
https://access.redhat.com/errata/RHSA-2019:1652
https://access.redhat.com/errata/RHSA-2019:1791
https://access.redhat.com/errata/RHSA-2019:1943
https://access.redhat.com/errata/RHSA-2019:2399
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
https://seclists.org/bugtraq/2019/Apr/25
https://seclists.org/bugtraq/2019/Mar/25
https://seclists.org/bugtraq/2019/Sep/49
https://security.netapp.com/advisory/ntap-20190327-0005/
https://support.apple.com/kb/HT210609
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3855.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://wiki.astralinux.ru/pages/viewpage.action?pageId=41192827
CWE
CWE-190
{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Fedora Project, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "Server 6 (Red Hat Enterprise Linux), Desktop 6 (Red Hat Enterprise Linux), Workstation 6 (Red Hat Enterprise Linux), Desktop 7 (Red Hat Enterprise Linux), Workstation 7 (Red Hat Enterprise Linux), Server 7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 28 (Fedora), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 29 (Fedora), Server AUS 7.6 (Red Hat Enterprise Linux), Server TUS 7.6 (Red Hat Enterprise Linux), 15.0 (OpenSUSE Leap), 30 (Fedora), for Scientific Computing 7 (Red Hat Enterprise Linux), for Power, little endian - Extended Update Supp 7.5 (Red Hat Enterprise Linux), for Power, big endian - Extended Update Support 7.5 (Red Hat Enterprise Linux), for IBM z Systems - Extended Update Support 7.5 (Red Hat Enterprise Linux), for IBM z Systems 7 (Red Hat Enterprise Linux), for ARM 64 7 (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), \u0434\u043e 1.8.1 (libssh2), for Power, big endian - Extended Update Support 7.6 (Red Hat Enterprise Linux), for Power, little endian - Extended Update Support 7.6 (Red Hat Enterprise Linux), for IBM z Systems - Extended Update Support 7.6 (Red Hat Enterprise Linux), Server- Update Services for SAP Solutions 7.3 (Red Hat Enterprise Linux), Server- Update Services for SAP Solutions 7.4 (Red Hat Enterprise Linux), Server- Update Services for SAP Solutions 7.6 (Red Hat Enterprise Linux), for Scientific Computing 6 (Red Hat Enterprise Linux), Server - AUS 7.4 (Red Hat Enterprise Linux), Server - TUS 7.4 (Red Hat Enterprise Linux), Server - EUS 7.4 (Red Hat Enterprise Linux), for Power, little endian - Extended Update Support 7.4 (Red Hat Enterprise Linux), for Power, big endian - Extended Update Support 7.4 (Red Hat Enterprise Linux), for IBM z Systems - Extended Update Support 7.4 (Red Hat Enterprise Linux), Server - AUS 7.3 (Red Hat Enterprise Linux), Server - TUS 7.3 (Red Hat Enterprise Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f libssh2:\nhttps://www.libssh2.org/CVE-2019-3855.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttp://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html \nhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://lists.debian.org/debian-lts-announce/2019/03/msg00032.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Fedora Project: \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/ \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/ \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/ \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/\n\n\u0414\u043b\u044f Astra Linux \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439, \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u0445 \u0432 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f\u0445 \u2116 20190912SE16 \u0438 \u2116 20191225SE81:\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=57444186\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=67111271",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "03.12.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "31.01.2020",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "04.11.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03898",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-3855",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, OpenSUSE Leap, Fedora, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), libssh2, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux Server 6 , Red Hat Inc. Red Hat Enterprise Linux Desktop 6 , Red Hat Inc. Red Hat Enterprise Linux Workstation 6 , Red Hat Inc. Red Hat Enterprise Linux Desktop 7 , Red Hat Inc. Red Hat Enterprise Linux Workstation 7 , Red Hat Inc. Red Hat Enterprise Linux Server 7 , Novell Inc. OpenSUSE Leap 42.3 , Fedora Project Fedora 28 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Fedora Project Fedora 29 , Red Hat Inc. Red Hat Enterprise Linux Server AUS 7.6 , Red Hat Inc. Red Hat Enterprise Linux Server TUS 7.6 , Novell Inc. OpenSUSE Leap 15.0 , Fedora Project Fedora 30 , Red Hat Inc. Red Hat Enterprise Linux for Scientific Computing 7 , Red Hat Inc. Red Hat Enterprise Linux for Power, little endian - Extended Update Supp 7.5 , Red Hat Inc. Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 , Red Hat Inc. Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 , Red Hat Inc. Red Hat Enterprise Linux for IBM z Systems 7 , Red Hat Inc. Red Hat Enterprise Linux for ARM 64 7 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , Red Hat Inc. Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6 , Red Hat Inc. Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6 , Red Hat Inc. Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6 , Red Hat Inc. Red Hat Enterprise Linux Server- Update Services for SAP Solutions 7.3 , Red Hat Inc. Red Hat Enterprise Linux Server- Update Services for SAP Solutions 7.4 , Red Hat Inc. Red Hat Enterprise Linux Server- Update Services for SAP Solutions 7.6 , Red Hat Inc. Red Hat Enterprise Linux for Scientific Computing 6 , Red Hat Inc. Red Hat Enterprise Linux Server - AUS 7.4 , Red Hat Inc. Red Hat Enterprise Linux Server - TUS 7.4 , Red Hat Inc. Red Hat Enterprise Linux Server - EUS 7.4 , Red Hat Inc. Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 , Red Hat Inc. Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 , Red Hat Inc. Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 , Red Hat Inc. Red Hat Enterprise Linux Server - AUS 7.3 , Red Hat Inc. Red Hat Enterprise Linux Server - TUS 7.3 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libssh2, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433 (CWE-190)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libssh2 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0443\u0442\u0435\u043c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043a SSH-\u0441\u0435\u0440\u0432\u0435\u0440\u0443",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html \nhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html \nhttp://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html \nhttp://seclists.org/fulldisclosure/2019/Sep/42 \nhttp://www.openwall.com/lists/oss-security/2019/03/18/3 \nhttp://www.securityfocus.com/bid/107485 \nhttps://access.redhat.com/errata/RHSA-2019:0679 \nhttps://access.redhat.com/errata/RHSA-2019:1175 \nhttps://access.redhat.com/errata/RHSA-2019:1652 \nhttps://access.redhat.com/errata/RHSA-2019:1791 \nhttps://access.redhat.com/errata/RHSA-2019:1943 \nhttps://access.redhat.com/errata/RHSA-2019:2399 \nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855 \nhttps://lists.debian.org/debian-lts-announce/2019/03/msg00032.html \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/ \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/ \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/ \nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/ \nhttps://seclists.org/bugtraq/2019/Apr/25 \nhttps://seclists.org/bugtraq/2019/Mar/25 \nhttps://seclists.org/bugtraq/2019/Sep/49 \nhttps://security.netapp.com/advisory/ntap-20190327-0005/ \nhttps://support.apple.com/kb/HT210609 \nhttps://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767 \nhttps://www.debian.org/security/2019/dsa-4431 \nhttps://www.libssh2.org/CVE-2019-3855.html \nhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=41192827",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-190",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…