A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
References
Configurations
Configuration 1 (hide)
|
History
14 Aug 2025, 00:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2025-5449 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2369705 - Issue Tracking, Third Party Advisory | |
References | () https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=261612179f740bc62ba363d98b3bd5e5573a811f - Patch | |
References | () https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=3443aec90188d6aab9282afc80a81df5ab72c4da - Patch | |
References | () https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=5504ff40515439a5fecbb17da7483000c4d12eb7 - Patch | |
References | () https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=78485f446af9b30e37eb8f177b81940710d54496 - Patch | |
References | () https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb - Patch | |
References | () https://www.libssh.org/security/advisories/CVE-2025-5449.txt - Third Party Advisory | |
First Time |
Libssh
Libssh libssh |
|
CPE | cpe:2.3:a:libssh:libssh:0.11.1:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:0.11.0:*:*:*:*:*:*:* |
29 Jul 2025, 14:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-25 18:15
Updated : 2025-08-14 00:39
NVD link : CVE-2025-5449
Mitre link : CVE-2025-5449
CVE.ORG link : CVE-2025-5449
JSON object : View
Products Affected
libssh
- libssh
CWE
CWE-190
Integer Overflow or Wraparound