Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-8277

Опубликовано: 09 сент. 2025
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 3.1

Описание

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

РелизСтатусПримечание
devel

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

needs-triage

esm-infra/xenial

needs-triage

jammy

needs-triage

noble

needs-triage

plucky

needs-triage

upstream

released

0.11.3

Показывать по

EPSS

Процентиль: 12%
0.00043
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
redhat
9 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

CVSS3: 3.1
nvd
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

msrc
7 дней назад

Libssh: memory exhaustion via repeated key exchange in libssh

CVSS3: 3.1
debian
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes ...

CVSS3: 3.1
github
8 дней назад

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

EPSS

Процентиль: 12%
0.00043
Низкий

3.1 Low

CVSS3