Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-5449

Опубликовано: 24 июн. 2025
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

Отчет

The Red Hat Product Security team has assessed the severity of this vulnerability as Moderate, given that it is only exploitable on 32-bit systems by authenticated users with SFTP access. The issue stems from an integer overflow in packet length validation that causes excessive memory allocation attempts, leading to a crash in the SFTP server. While the flaw does not enable memory corruption or code execution, it can disrupt availability for legitimate users. No Red Hat products or offerings are affected by this vulnerability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsshNot affected
Red Hat Enterprise Linux 6libssh2Not affected
Red Hat Enterprise Linux 7libssh2Not affected
Red Hat Enterprise Linux 8libsshNot affected
Red Hat Enterprise Linux 9libsshNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=2369705libssh: Integer Overflow in libssh SFTP Server Packet Length Validation Leading to Denial of Service

EPSS

Процентиль: 25%
0.00083
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 1 месяца назад

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

CVSS3: 4.3
nvd
около 1 месяца назад

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

CVSS3: 4.3
debian
около 1 месяца назад

A flaw was found in the SFTP server message decoding logic of libssh. ...

CVSS3: 4.3
github
около 1 месяца назад

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

CVSS3: 4.3
fstec
4 месяца назад

Уязвимость функции sftp_decode_channel_data_to_packet() библиотеки libssh, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 25%
0.00083
Низкий

4.3 Medium

CVSS3