CVE-2025-5987
- EPSS 0.29%
- Veröffentlicht 07.07.2025 14:24:12
- Zuletzt bearbeitet 20.03.2026 21:17:12
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because ...
CVE-2025-5351
- EPSS 0.35%
- Veröffentlicht 04.07.2025 08:16:47
- Zuletzt bearbeitet 08.01.2026 04:15:54
A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading t...
CVE-2025-5372
- EPSS 0.31%
- Veröffentlicht 04.07.2025 06:01:27
- Zuletzt bearbeitet 10.12.2025 19:16:14
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and li...
CVE-2025-5318
- EPSS 0.3%
- Veröffentlicht 24.06.2025 14:15:30
- Zuletzt bearbeitet 27.02.2026 17:16:24
A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and t...
CVE-2023-6004
- EPSS 0.05%
- Veröffentlicht 03.01.2024 17:15:11
- Zuletzt bearbeitet 04.11.2025 19:16:23
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through th...
CVE-2023-6918
- EPSS 0.36%
- Veröffentlicht 19.12.2023 00:15:08
- Zuletzt bearbeitet 15.02.2025 01:15:09
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, ...
CVE-2023-48795
- EPSS 50.71%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 12.05.2026 11:16:15
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...
CVE-2023-3603
- EPSS 0.12%
- Veröffentlicht 21.07.2023 20:15:16
- Zuletzt bearbeitet 21.11.2024 08:17:38
A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for ...
CVE-2023-2283
- EPSS 0.19%
- Veröffentlicht 26.05.2023 18:15:13
- Zuletzt bearbeitet 03.11.2025 21:15:57
A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory...
CVE-2023-1667
- EPSS 1.09%
- Veröffentlicht 26.05.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:39:39
A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.