Логотип exploitDog
bind:CVE-2025-5372
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-5372

Количество 14

Количество 14

ubuntu логотип

CVE-2025-5372

5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
redhat логотип

CVE-2025-5372

5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2025-5372

5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
msrc логотип

CVE-2025-5372

5 месяцев назад

Libssh: incorrect return code handling in ssh_kdf() in libssh

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2025-5372

5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older ...

CVSS3: 5
EPSS: Низкий
rocky логотип

RLSA-2025:21977

6 дней назад

Moderate: libssh security update

EPSS: Низкий
github логотип

GHSA-59w5-j22f-h3rv

5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-21977

8 дней назад

ELSA-2025-21977: libssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2025-07644

7 месяцев назад

Уязвимость функции ssh_kdf() библиотеки libssh, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02281-1

5 месяцев назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02279-1

5 месяцев назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02278-1

5 месяцев назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02229-1

5 месяцев назад

Security update for libssh

EPSS: Низкий
redos логотип

ROS-20250924-09

2 месяца назад

Множественные уязвимости libssh

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-5372

Libssh: incorrect return code handling in ssh_kdf() in libssh

CVSS3: 5
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older ...

CVSS3: 5
0%
Низкий
5 месяцев назад
rocky логотип
RLSA-2025:21977

Moderate: libssh security update

0%
Низкий
6 дней назад
github логотип
GHSA-59w5-j22f-h3rv

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
5 месяцев назад
oracle-oval логотип
ELSA-2025-21977

ELSA-2025-21977: libssh security update (MODERATE)

8 дней назад
fstec логотип
BDU:2025-07644

Уязвимость функции ssh_kdf() библиотеки libssh, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5
0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02281-1

Security update for libssh

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02279-1

Security update for libssh

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02278-1

Security update for libssh

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02229-1

Security update for libssh

5 месяцев назад
redos логотип
ROS-20250924-09

Множественные уязвимости libssh

CVSS3: 6.5
2 месяца назад

Уязвимостей на страницу