Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-8277

Опубликовано: 09 сент. 2025
Источник: redhat
CVSS3: 3.1
EPSS Низкий

Описание

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

Отчет

The Red Hat Product Security team has assessed the severity of this vulnerability as Low.The issue requires an authenticated client to repeatedly initiate key exchanges with incorrect guesses, which leads to memory not being properly released. While this flaw can result in gradual memory exhaustion and potential denial of service (DoS) on the client side, it is not easily exploitable in typical usage scenarios and does not affect servers. The vulnerability does not compromise confidentiality or integrity and poses limited impact on system availability under normal operating conditions.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. It is strongly advised to apply updated libssh packages once available to prevent memory exhaustion risks on client systems.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsshFix deferred
Red Hat Enterprise Linux 6libssh2Out of support scope
Red Hat Enterprise Linux 7libssh2Fix deferred
Red Hat Enterprise Linux 8libsshFix deferred
Red Hat Enterprise Linux 9libsshFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-401
https://bugzilla.redhat.com/show_bug.cgi?id=2383888libssh: Memory Exhaustion via Repeated Key Exchange in libssh

EPSS

Процентиль: 12%
0.00043
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
ubuntu
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

CVSS3: 3.1
nvd
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

CVSS3: 3.1
msrc
7 дней назад

Libssh: memory exhaustion via repeated key exchange in libssh

CVSS3: 3.1
debian
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes ...

CVSS3: 3.1
github
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

EPSS

Процентиль: 12%
0.00043
Низкий

3.1 Low

CVSS3