Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-0966

Источник: debian
EPSS Низкий

Описание

[Buffer underflow in ssh_get_hexa() on invalid input]

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libsshfixed0.12.0-1package
libsshno-dsatrixiepackage
libsshno-dsabookwormpackage
libsshpostponedbullseyepackage

Примечания

  • https://www.libssh.org/security/advisories/CVE-2026-0966.txt

  • Documentation: https://git.libssh.org/projects/libssh.git/commit/?id=3e1d276a5a030938a8f144f46ff4f2a2efe31ced (libssh-0.11.4)

  • Tests: https://git.libssh.org/projects/libssh.git/commit/?id=b156391833c66322436cf177d57e10b0325fbcc8 (libssh-0.11.4)

  • Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=6ba5ff1b7b1547a59f750fbc06b89737b7456117 (libssh-0.11.4)

EPSS

Процентиль: 25%
0.00086
Низкий

Связанные уязвимости

ubuntu
около 2 месяцев назад

[Buffer underflow in ssh_get_hexa() on invalid input]

CVSS3: 6.5
redhat
около 2 месяцев назад

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

CVSS3: 6.5
github
4 дня назад

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

suse-cvrf
27 дней назад

Security update for libssh

suse-cvrf
27 дней назад

Security update for libssh

EPSS

Процентиль: 25%
0.00086
Низкий