Libssh

Libssh

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 07.04.2026 16:34:10
  • Zuletzt bearbeitet 29.04.2026 12:11:05

A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, a...

  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 20:06:33
  • Zuletzt bearbeitet 02.04.2026 17:33:46

A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to ...

  • EPSS 0.03%
  • Veröffentlicht 26.03.2026 20:06:30
  • Zuletzt bearbeitet 02.04.2026 17:28:27

A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtrackin...

  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 20:06:29
  • Zuletzt bearbeitet 13.04.2026 20:15:09

A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to re...

  • EPSS 0.05%
  • Veröffentlicht 26.03.2026 20:06:28
  • Zuletzt bearbeitet 11.05.2026 17:16:11

A flaw was found in libssh. The API function `ssh_get_hexa()` is vulnerable to a denial of service when processing zero-length input. This can be exploited remotely by an attacker during GSSAPI (Generic Security Service Application Program Interface)...

  • EPSS 0.02%
  • Veröffentlicht 26.03.2026 20:06:28
  • Zuletzt bearbeitet 30.04.2026 16:43:18

A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the user execute them unde...

  • EPSS 0.11%
  • Veröffentlicht 08.03.2026 10:32:19
  • Zuletzt bearbeitet 12.03.2026 19:02:31

A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argumen...

  • EPSS 0.03%
  • Veröffentlicht 20.08.2025 12:19:18
  • Zuletzt bearbeitet 15.04.2026 00:35:42

There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a...

  • EPSS 0.18%
  • Veröffentlicht 25.07.2025 18:15:26
  • Zuletzt bearbeitet 08.01.2026 04:15:55

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allo...

  • EPSS 0.03%
  • Veröffentlicht 24.07.2025 14:14:47
  • Zuletzt bearbeitet 17.11.2025 21:15:58

A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cau...