Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-26466

Опубликовано: 18 фев. 2025
Источник: redhat
CVSS3: 5.9
EPSS Средний

Описание

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

Отчет

The versions of OpenSSH as shipped with Red Hat Enterprise Linux 9 and older, and Red Hat Enterprise Linux CoreOS are not affected by this vulnerability as the OpenSSH versions distributed with those products are based on previous versions of OpenSSH's version that introduced the issue (openssh-9.5p1 upstream version). Also this issue marked as a moderate severity vulnerability rather than important because, while it enables a pre-authentication denial-of-service (DoS) attack, it does not allow remote code execution, privilege escalation, or data exfiltration. The attack is asymmetric in resource consumption, meaning an attacker can force excessive CPU and memory usage, but it still requires repeated connection attempts to sustain the impact. Moreover, OpenSSH provides built-in mitigation mechanisms, such as LoginGraceTime, MaxStartups, and PerSourcePenalties, which can significantly limit the attack’s effectiveness if properly configured.

Меры по смягчению последствий

This issue can be mitigated by setting the following three different options in the sshd configuration file located at: /etc/ssh/sshd_config MaxStartups: Set to a reasonable value, this option controls the maximum number of concurrent unauthenticated connections the SSH server accepts; PerSourcePenalties: Set its suboptions to a reasonable value, this option is used to help sshd to detect and drop connections that are potentially malicious for the SSH server; LoginGraceTime: Set to a resonable value, this option controls how much time the SSH server will wait the client to authenticate before dropping its connection; All the three option above needs to be set to implement a full mitigation for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10opensshNot affected
Red Hat Enterprise Linux 6opensshNot affected
Red Hat Enterprise Linux 7opensshNot affected
Red Hat Enterprise Linux 8opensshNot affected
Red Hat Enterprise Linux 9opensshNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2345043openssh: Denial-of-service in OpenSSH

EPSS

Процентиль: 98%
0.46586
Средний

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
6 месяцев назад

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

CVSS3: 5.9
nvd
6 месяцев назад

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

CVSS3: 5.9
msrc
6 месяцев назад

Описание отсутствует

CVSS3: 5.9
debian
6 месяцев назад

A flaw was found in the OpenSSH package. For each ping packet the SSH ...

CVSS3: 5.9
github
6 месяцев назад

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

EPSS

Процентиль: 98%
0.46586
Средний

5.9 Medium

CVSS3