Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-47913

Опубликовано: 13 нояб. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic("unreachable") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.

Отчет

This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling—or intercepting—SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into “unreachable” code paths instead of being handled gracefully—making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-rhel9Not affected
Multicluster Engine for Kubernetesmulticluster-engine/cluster-image-set-controller-rhel8Affected
Multicluster Engine for Kubernetesmulticluster-engine/cluster-image-set-controller-rhel9Affected
Multicluster Engine for Kubernetesmulticluster-engine/hive-rhel8Affected
Multicluster Engine for Kubernetesmulticluster-engine/hive-rhel9Affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-agent-base-rhel9Affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-rhel8Affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-rhel9Affected
OpenShift Developer Tools and Servicesopenshift4/ose-jenkinsAffected
OpenShift Serverlessopenshift-serverless-1/kn-plugin-func-func-util-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2414943golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS

EPSS

Процентиль: 12%
0.00039
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
5 месяцев назад

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

CVSS3: 7.5
nvd
5 месяцев назад

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

CVSS3: 7.5
msrc
5 месяцев назад

Potential denial of service in golang.org/x/crypto/ssh/agent

CVSS3: 7.5
debian
5 месяцев назад

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed respons ...

suse-cvrf
22 дня назад

Security update for amazon-ssm-agent

EPSS

Процентиль: 12%
0.00039
Низкий

7.5 High

CVSS3

Уязвимость CVE-2025-47913