Логотип exploitDog
bind:CVE-2026-0966
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-0966

Количество 6

Количество 6

ubuntu логотип

CVE-2026-0966

около 2 месяцев назад

[Buffer underflow in ssh_get_hexa() on invalid input]

EPSS: Низкий
redhat логотип

CVE-2026-0966

около 2 месяцев назад

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2026-0966

[Buffer underflow in ssh_get_hexa() on invalid input]

EPSS: Низкий
github логотип

GHSA-wcqf-w94x-4wg2

4 дня назад

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0779-1

28 дней назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0778-1

28 дней назад

Security update for libssh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-0966

[Buffer underflow in ssh_get_hexa() on invalid input]

около 2 месяцев назад
redhat логотип
CVE-2026-0966

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

CVSS3: 6.5
около 2 месяцев назад
debian логотип
CVE-2026-0966

[Buffer underflow in ssh_get_hexa() on invalid input]

-
github логотип
GHSA-wcqf-w94x-4wg2

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

CVSS3: 6.5
4 дня назад
suse-cvrf логотип
SUSE-SU-2026:0779-1

Security update for libssh

28 дней назад
suse-cvrf логотип
SUSE-SU-2026:0778-1

Security update for libssh

28 дней назад

Уязвимостей на страницу