{"id":"CVE-2019-3860","details":"An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.","modified":"2026-04-16T00:02:11.283121866Z","published":"2019-03-25T19:29:01.883Z","related":["SUSE-SU-2019:0655-1","SUSE-SU-2019:13982-1","SUSE-SU-2019:13997-1","SUSE-SU-2019:14098-1","SUSE-SU-2019:14099-1","SUSE-SU-2019:1606-1","SUSE-SU-2019:1606-2","SUSE-SU-2020:3551-1","openSUSE-SU-2019:1109-1","openSUSE-SU-2020:2126-1","openSUSE-SU-2020:2129-1","openSUSE-SU-2024:10999-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}]},{"cpe":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"15.0"}]},{"cpe":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"42.3"}]}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Apr/25"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190327-0005/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4431"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860"},{"type":"FIX","url":"https://www.libssh2.org/CVE-2019-3860.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libssh2/libssh2","events":[{"introduced":"3f24fb005e78fd61fa37e797b17e733bd32b452f"},{"last_affected":"30e9c1347e3b8baa2951db612f05e6d87fc8e2f2"}],"database_specific":{"cpe":"cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0.3"},{"last_affected":"1.8.0"}]}}],"versions":["RELEASE.0.10","RELEASE.0.11","RELEASE.0.12","RELEASE.0.13","RELEASE.0.14","RELEASE.0.15","RELEASE.0.16","RELEASE.0.17","RELEASE.0.18","RELEASE.0.3","RELEASE.0.5","RELEASE.0.6","RELEASE.0.7","RELEASE.0.8","RELEASE.1.0","RELEASE.1.1","beforenb-0.14","beforenb2-0.14","libssh2-1.2","libssh2-1.2.1","libssh2-1.2.3","libssh2-1.2.4","libssh2-1.2.5","libssh2-1.2.6","libssh2-1.2.7","libssh2-1.2.8","libssh2-1.2.9","libssh2-1.3.0","libssh2-1.4.0","libssh2-1.4.1","libssh2-1.4.2","libssh2-1.4.3","libssh2-1.5.0","libssh2-1.6.0","libssh2-1.7.0","libssh2-1.8.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-3860.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}