Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-5987

Опубликовано: 26 апр. 2025
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.

Отчет

Red Hat Product Security Team has rated this vulnerability as having a Moderate security impact. This is due to the high complexity in exploiting this flaw. For a successful attack to take place an attacker needs to manage to exhaust the heap space to for the OpenSSL library to return the error code which wrongly match the SSH_OK return code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libssh2Out of support scope
Red Hat Enterprise Linux 7libssh2Out of support scope
Red Hat Enterprise Linux 8libsshNot affected
Red Hat Enterprise Linux 10libsshFixedRHSA-2025:2348417.12.2025
Red Hat Enterprise Linux 10.0 Extended Update SupportlibsshFixedRHSA-2026:042712.01.2026
Red Hat Enterprise Linux 9libsshFixedRHSA-2025:2348318.12.2025
Red Hat Enterprise Linux 9libsshFixedRHSA-2025:2348318.12.2025
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionslibsshFixedRHSA-2026:043012.01.2026
Red Hat Enterprise Linux 9.4 Extended Update SupportlibsshFixedRHSA-2026:043112.01.2026
Red Hat Enterprise Linux 9.6 Extended Update SupportlibsshFixedRHSA-2026:042812.01.2026

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-393
https://bugzilla.redhat.com/show_bug.cgi?id=2376219libssh: Invalid return code for chacha20 poly1305 with OpenSSL backend

EPSS

Процентиль: 22%
0.00071
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
9 месяцев назад

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.

CVSS3: 8.1
nvd
9 месяцев назад

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.

CVSS3: 5
msrc
9 месяцев назад

Libssh: invalid return code for chacha20 poly1305 with openssl backend

CVSS3: 8.1
debian
9 месяцев назад

A flaw was found in libssh when using the ChaCha20 cipher with the Ope ...

rocky
3 месяца назад

Moderate: libssh security update

EPSS

Процентиль: 22%
0.00071
Низкий

8.1 High

CVSS3