Description
A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauth_password of the file src/userauth.c. Such manipulation of the argument username_len/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue.
Problem types
Timeline
| 2026-05-01: | Advisory disclosed |
| 2026-05-01: | VulDB entry created |
| 2026-05-01: | VulDB entry last update |
Credits
dapickle (VulDB User)
References
vuldb.com/vuln/360555 (VDB-360555 | libssh2 userauth.c userauth_password integer overflow)
vuldb.com/vuln/360555/cti (VDB-360555 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/805564 (Submit #805564 | libssh2 <= 1.11.1 Integer Overflow)
github.com/libssh2/libssh2/pull/1858
github.com/...ommit/256d04b60d80bf1190e96b0ad1e91b2174d744b1
github.com/libssh2/libssh2/