CVE-2026-3731

A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-08 11:15

Updated : 2026-03-12 19:02


NVD link : CVE-2026-3731

Mitre link : CVE-2026-3731

CVE.ORG link : CVE-2026-3731


JSON object : View

Products Affected

libssh

  • libssh
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read