No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauth_password of the file src/userauth.c. Such manipulation of the argument username_len/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue. | |
| Title | libssh2 userauth.c userauth_password integer overflow | |
| First Time appeared |
Libssh2
Libssh2 libssh2 |
|
| Weaknesses | CWE-189 CWE-190 |
|
| CPEs | cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Libssh2
Libssh2 libssh2 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-01T21:30:11.006Z
Reserved: 2026-05-01T10:45:11.583Z
Link: CVE-2026-7598
No data.
Status : Received
Published: 2026-05-01T22:16:16.947
Modified: 2026-05-01T22:16:16.947
Link: CVE-2026-7598
No data.
OpenCVE Enrichment
Updated: 2026-05-01T23:30:06Z