4.5
CVE-2025-4877
- EPSS 0.02%
- Published 20.08.2025 12:19:18
- Last modified 20.08.2025 14:39:07
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://www.libssh.org
≫
Package
libssh
Default Statusunaffected
Version <
0.11.2
Version
0
Status
affected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 6
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 7
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.025 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 4.5 | 1 | 3.4 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.