libssh2 1.8.2 release (Mar 25, 2019)

Summary

Multiple integer overflow and out of bounds read/write vulnerabilities in the SSL VPN web-mode SSH client may allow an unauthenticated attacker to cause the SSL VPN user session to break (Denial of service) and possibly to run arbitrary code via specially crafted packets sent from a malicious SSH server.

This concerns the following CVEs on a precaution basis:

* CVE-2019-3855 integer overflow when reading a specially crafted packet

* CVE-2019-3856 integer overflow if the server sent an extremely large number of keyboard prompts

* CVE-2019-3857 integer overflow when receiving a specially crafted exit signal message channel packet

* CVE-2019-3858 zero byte allocation when reading a specially crafted SFTP packet

* CVE-2019-3859 out of bounds reads in _libssh2_packet_require(v)

* CVE-2019-3860 out of bounds reads when processing specially crafted SFTP packets

* CVE-2019-3861 out of bounds read when processing a specially crafted packet

* CVE-2019-3862 out of bounds read when receiving a specially crafted exit status message channel packet

* CVE-2019-3863 integer overflow in userauth_keyboard_interactive with a number of extremely long prompt strings

Affected Products

FortiOS 6.2.0
FortiOS 6.0.0 to 6.0.6
FortiOS 5.6.0 to 5.6.10
other versions are not impacted.

Solutions

There is no known exploit for these vulnerabilities and the affected FortiOS code was patched on 5.6.11, 6.0.7 and 6.2.1, by measure of precaution.
Workarounds:
Do not access SSH server using SSH client in SSL VPN web-mode if the remote SSH server is operating under an untrusted environment.