<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>libssh2 1.8.2 release (Mar 25, 2019)</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-099</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2019-11-14T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2019-11-14T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2019-11-14T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Multiple integer overflow and out of bounds read/write vulnerabilities in the SSL VPN web-mode SSH client may allow an unauthenticated attacker to cause the SSL VPN user session to break (Denial of service) and possibly to run arbitrary code via specially crafted packets sent from a malicious SSH server.This concerns the following CVEs on a precaution basis:CVE-2019-3855 integer overflow when reading a specially crafted packetCVE-2019-3856 integer overflow if the server sent an extremely large number of keyboard promptsCVE-2019-3857 integer overflow when receiving a specially crafted exit signal message channel packetCVE-2019-3858 zero byte allocation when reading a specially crafted SFTP packetCVE-2019-3859 out of bounds reads in _libssh2_packet_require(v)CVE-2019-3860 out of bounds reads when processing specially crafted SFTP packetsCVE-2019-3861 out of bounds read when processing a specially crafted packetCVE-2019-3862 out of bounds read when receiving a specially crafted exit status message channel packetCVE-2019-3863 integer overflow in userauth_keyboard_interactive with a number of extremely long prompt strings
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Denial of service
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiOS 6.2.0FortiOS 6.0.0 to 6.0.6FortiOS 5.6.0 to 5.6.10other versions are not impacted.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            There is no known exploit for these vulnerabilities and the affected FortiOS code was patched on 5.6.11, 6.0.7 and 6.2.1, by measure of precaution.Workarounds:Do not access SSH server using SSH client in SSL VPN web-mode if the remote SSH server is operating under an untrusted environment.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <Vulnerability Ordinal="1">
        <Title>libssh2 1.8.2 release (Mar 25, 2019)</Title>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>9.8</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-099</URL>
                <Description>libssh2 1.8.2 release (Mar 25, 2019)</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>