← Volver a CVEs
CVE-2025-5449
MEDIUM6.5
Descripcion
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
Detalles CVE
Puntuacion CVSS v3.16.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado7/25/2025
Ultima modificacion1/8/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
libssh:libssh
Debilidades (CWE)
CWE-190
Referencias
https://access.redhat.com/security/cve/CVE-2025-5449(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2369705(secalert@redhat.com)
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=261612179f740bc62ba363d98b3bd5e5573a811f(secalert@redhat.com)
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=3443aec90188d6aab9282afc80a81df5ab72c4da(secalert@redhat.com)
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=5504ff40515439a5fecbb17da7483000c4d12eb7(secalert@redhat.com)
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=78485f446af9b30e37eb8f177b81940710d54496(secalert@redhat.com)
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb(secalert@redhat.com)
https://www.libssh.org/security/advisories/CVE-2025-5449.txt(secalert@redhat.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.