Metrics
Affected Vendors & Products
Thu, 08 Jan 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libssh
Libssh libssh |
|
| CPEs | cpe:2.3:a:libssh:libssh:0.11.0:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:0.11.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Libssh
Libssh libssh |
Fri, 25 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 25 Jul 2025 17:30:00 +0000
Fri, 04 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service. | |
| Title | libssh: Integer Overflow in libssh SFTP Server Packet Length Validation Leading to Denial of Service | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-07-25T17:19:39.345Z
Updated: 2026-01-08T03:11:05.447Z
Reserved: 2025-06-02T07:10:17.845Z
Link: CVE-2025-5449
Updated: 2025-07-25T17:34:02.421Z
Status : Modified
Published: 2025-07-25T18:15:26.967
Modified: 2026-01-08T04:15:55.020
Link: CVE-2025-5449