{
  "threat_severity" : "Important",
  "public_date" : "2019-03-13T00:00:00Z",
  "bugzilla" : {
    "description" : "libssh2: Integer overflow in transport read resulting in out of bounds write",
    "id" : "1687303",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1687303"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-190->CWE-787",
  "details" : [ "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server." ],
  "statement" : "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.",
  "acknowledgement" : "Red Hat would like to thank the libssh2 project for reporting this issue. Upstream acknowledges Chris Coulson (Canonical Ltd.) as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2019-07-02T00:00:00Z",
    "advisory" : "RHSA-2019:1652",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "libssh2-0:1.4.2-3.el6_10.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2019-03-28T00:00:00Z",
    "advisory" : "RHSA-2019:0679",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "libssh2-0:1.4.3-12.el7_6.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Advanced Update Support",
    "release_date" : "2019-08-07T00:00:00Z",
    "advisory" : "RHSA-2019:2399",
    "cpe" : "cpe:/o:redhat:rhel_aus:7.3",
    "package" : "libssh2-0:1.4.3-11.el7_3.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Telco Extended Update Support",
    "release_date" : "2019-08-07T00:00:00Z",
    "advisory" : "RHSA-2019:2399",
    "cpe" : "cpe:/o:redhat:rhel_tus:7.3",
    "package" : "libssh2-0:1.4.3-11.el7_3.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions",
    "release_date" : "2019-08-07T00:00:00Z",
    "advisory" : "RHSA-2019:2399",
    "cpe" : "cpe:/o:redhat:rhel_e4s:7.3",
    "package" : "libssh2-0:1.4.3-11.el7_3.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.4 Extended Update Support",
    "release_date" : "2019-07-30T00:00:00Z",
    "advisory" : "RHSA-2019:1943",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.4",
    "package" : "libssh2-0:1.4.3-11.el7_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.5 Extended Update Support",
    "release_date" : "2019-07-16T00:00:00Z",
    "advisory" : "RHSA-2019:1791",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.5",
    "package" : "libssh2-0:1.4.3-11.el7_5.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-05-14T00:00:00Z",
    "advisory" : "RHSA-2019:1175",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt:rhel-8000020190510171727.55190bc5"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 8 Advanced Virtualization",
    "fix_state" : "Affected",
    "package_name" : "virt:8.0.0/libssh2",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8::el8"
  }, {
    "product_name" : "Red Hat Virtualization 4",
    "fix_state" : "Will not fix",
    "package_name" : "redhat-virtualization-host",
    "cpe" : "cpe:/o:redhat:rhev_hypervisor:4",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat Virtualization 4",
    "fix_state" : "Will not fix",
    "package_name" : "rhvm-appliance",
    "cpe" : "cpe:/o:redhat:rhev_hypervisor:4",
    "impact" : "low"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-3855\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-3855\nhttps://www.libssh2.org/CVE-2019-3855.html" ],
  "name" : "CVE-2019-3855",
  "csaw" : false
}