Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-26465

Опубликовано: 18 фев. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 6.8

Описание

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

РелизСтатусПримечание
devel

released

9.9p1-3ubuntu3
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

released

1:7.6p1-4ubuntu0.7+esm4
esm-infra/focal

released

1:8.2p1-4ubuntu0.12
esm-infra/xenial

released

1:7.2p2-4ubuntu2.10+esm7
fips-preview/jammy

needed

fips-updates/bionic

released

1:7.9p1-10~ubuntu18.04.fips.0.10
fips-updates/focal

released

1:8.2p1-4ubuntu0.fips.0.12
fips-updates/jammy

released

1:8.9p1-3ubuntu0.11+Fips1
fips-updates/noble

released

1:9.6p1-3ubuntu13.12+Fips1

Показывать по

РелизСтатусПримечание
devel

ignored

esm-apps/bionic

ignored

esm-apps/focal

ignored

esm-apps/jammy

ignored

esm-apps/noble

ignored

focal

ignored

jammy

ignored

noble

ignored

oracular

ignored

plucky

ignored

Показывать по

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
redhat
10 месяцев назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
nvd
10 месяцев назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
msrc
10 месяцев назад

Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled

CVSS3: 6.8
debian
10 месяцев назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...

suse-cvrf
10 месяцев назад

Security update for openssh8.4

6.8 Medium

CVSS3