Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Libssh SFTP Extension May Allow Remote Code Execution
DEBIAN-CVE-2026-3731
Summary
Libssh's SFTP extension has a weakness that can allow an attacker to access unauthorized data. This means an attacker may be able to access sensitive information or even take control of your system. To fix this, update to version 0.11.4 or 0.12.0 of libssh.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| debian | libssh | All versions | – |
| debian | libssh | All versions | – |
| debian | libssh | All versions | – |
| debian | libssh | All versions | – |
Original title
A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension ...
Original description
A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.
osv CVSS3.1
9.8
- https://security-tracker.debian.org/tracker/CVE-2026-3731 Vendor Advisory
Published: 8 Mar 2026 · Updated: 14 Mar 2026 · First seen: 10 Mar 2026