5.9

CVE-2025-26466

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

Data is provided by the National Vulnerability Database (NVD)
OpenbsdOpenssh Version9.5 Updatep1
OpenbsdOpenssh Version9.6 Update-
OpenbsdOpenssh Version9.6 Updatep1
OpenbsdOpenssh Version9.7 Update-
OpenbsdOpenssh Version9.7 Updatep1
OpenbsdOpenssh Version9.8 Update-
OpenbsdOpenssh Version9.8 Updatep1
OpenbsdOpenssh Version9.9 Update-
OpenbsdOpenssh Version9.9 Updatep1
CanonicalUbuntu Linux Version24.04 SwEditionlts
CanonicalUbuntu Linux Version24.10
DebianDebian Linux Version11.0
DebianDebian Linux Version12.0
DebianDebian Linux Version13.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 46.32% 0.976
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
secalert@redhat.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.