Vigilance.fr - libssh2: out-of-bounds memory reading via _libssh2_packet_add(), analyzed on 08/09/2023
November 2023 by Vigilance.fr
An attacker can force a read at an invalid memory address of libssh2, via _libssh2_packet_add(), in order to trigger a denial of service, or to obtain sensitive information.
Plus d'information sur : https://vigilance.fr/vulnerability/libssh2-out-of-bounds-memory-reading-via-libssh2-packet-add-42224