openSUSE Security Update : libssh2_org (openSUSE-2020-2129)

critical Nessus Plugin ID 143452

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for libssh2_org fixes the following issues :

- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922] Enhancements and bugfixes :

- adds ECDSA keys and host key support when using OpenSSL

- adds ED25519 key and host key support when using OpenSSL 1.1.1

- adds OpenSSH style key file reading

- adds AES CTR mode support when using WinCNG

- adds PEM passphrase protected file support for Libgcrypt and WinCNG

- adds SHA256 hostkey fingerprint

- adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path()

- adds explicit zeroing of sensitive data in memory

- adds additional bounds checks to network buffer reads

- adds the ability to use the server default permissions when creating sftp directories

- adds support for building with OpenSSL no engine flag

- adds support for building with LibreSSL

- increased sftp packet size to 256k

- fixed oversized packet handling in sftp

- fixed building with OpenSSL 1.1

- fixed a possible crash if sftp stat gets an unexpected response

- fixed incorrect parsing of the KEX preference string value

- fixed conditional RSA and AES-CTR support

- fixed a small memory leak during the key exchange process

- fixed a possible memory leak of the ssh banner string

- fixed various small memory leaks in the backends

- fixed possible out of bounds read when parsing public keys from the server

- fixed possible out of bounds read when parsing invalid PEM files

- no longer null terminates the scp remote exec command

- now handle errors when diffie hellman key pair generation fails

- improved building instructions

- improved unit tests

- Version update to 1.8.2: [bsc#1130103] Bug fixes :

- Fixed the misapplied userauth patch that broke 1.8.1

- moved the MAX size declarations from the public header This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected libssh2_org packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1130103

https://bugzilla.opensuse.org/show_bug.cgi?id=1178083

Plugin Details

Severity: Critical

ID: 143452

File Name: openSUSE-2020-2129.nasl

Version: 1.4

Type: local

Agent: unix

Published: 12/3/2020

Updated: 2/7/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-3855

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2019-3862

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libssh2-1-debuginfo, p-cpe:/a:novell:opensuse:libssh2-1-32bit-debuginfo, p-cpe:/a:novell:opensuse:libssh2-devel, p-cpe:/a:novell:opensuse:libssh2-1-32bit, p-cpe:/a:novell:opensuse:libssh2_org-debugsource, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:libssh2-1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/1/2020

Vulnerability Publication Date: 3/21/2019

Reference Information

CVE: CVE-2019-17498, CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858, CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, CVE-2019-3862, CVE-2019-3863