Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-26465

Опубликовано: 18 фев. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 6.8

Описание

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

РелизСтатусПримечание
devel

released

9.9p1-3ubuntu3
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

released

1:7.6p1-4ubuntu0.7+esm4
esm-infra/focal

not-affected

1:8.2p1-4ubuntu0.12
esm-infra/xenial

released

1:7.2p2-4ubuntu2.10+esm7
fips-preview/jammy

needed

fips-updates/bionic

released

1:7.9p1-10~ubuntu18.04.fips.0.10
fips-updates/focal

released

1:8.2p1-4ubuntu0.fips.0.12
fips-updates/jammy

released

1:8.9p1-3ubuntu0.11+Fips1
fips-updates/xenial

released

1:7.2p2-4ubuntu2.fips.2.10.7

Показывать по

РелизСтатусПримечание
devel

ignored

esm-apps/bionic

ignored

esm-apps/focal

ignored

esm-apps/jammy

ignored

esm-apps/noble

ignored

focal

ignored

jammy

ignored

noble

ignored

oracular

ignored

plucky

ignored

Показывать по

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
redhat
4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
nvd
4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
msrc
4 месяца назад

Описание отсутствует

CVSS3: 6.8
debian
4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...

suse-cvrf
4 месяца назад

Security update for openssh8.4

6.8 Medium

CVSS3

Уязвимость CVE-2025-26465