Libssh

Libssh

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 20.08.2025 12:19:18
  • Zuletzt bearbeitet 20.08.2025 14:39:07

There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a...

  • EPSS 0.1%
  • Veröffentlicht 25.07.2025 18:15:26
  • Zuletzt bearbeitet 14.08.2025 00:39:43

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allo...

  • EPSS 0.02%
  • Veröffentlicht 24.07.2025 14:14:47
  • Zuletzt bearbeitet 14.08.2025 00:45:36

A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cau...

  • EPSS 0.06%
  • Veröffentlicht 07.07.2025 14:24:12
  • Zuletzt bearbeitet 22.08.2025 13:11:29

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because ...

  • EPSS 0.04%
  • Veröffentlicht 04.07.2025 08:16:47
  • Zuletzt bearbeitet 22.08.2025 13:50:58

A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading t...

  • EPSS 0.06%
  • Veröffentlicht 04.07.2025 06:01:27
  • Zuletzt bearbeitet 22.08.2025 14:01:21

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and li...

  • EPSS 0.06%
  • Veröffentlicht 24.06.2025 14:15:30
  • Zuletzt bearbeitet 22.09.2025 20:15:39

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and t...

  • EPSS 0.07%
  • Veröffentlicht 03.01.2024 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:42:57

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through th...

  • EPSS 0.36%
  • Veröffentlicht 19.12.2023 00:15:08
  • Zuletzt bearbeitet 15.02.2025 01:15:09

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, ...

Medienbericht Exploit
  • EPSS 64.06%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...