6.5
CVE-2025-54804
- EPSS 0.05%
- Veröffentlicht 05.08.2025 00:05:20
- Zuletzt bearbeitet 13.08.2025 18:32:38
- Quelle security-advisories@github.com
- Teams Watchlist Login
- Unerledigt Login
Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Russh Project ≫ Russh SwPlatformrust Version < 0.54.1
Warpgate Project ≫ Warpgate Version < 0.16.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.167 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
security-advisories@github.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-190 Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.