A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
History

Fri, 25 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
Title libssh: Integer Overflow in libssh SFTP Server Packet Length Validation Leading to Denial of Service Libssh: integer overflow in libssh sftp server packet length validation leading to denial of service
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Fri, 04 Jul 2025 12:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
Title libssh: Integer Overflow in libssh SFTP Server Packet Length Validation Leading to Denial of Service
Weaknesses CWE-190
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-07-25T17:19:39.345Z

Updated: 2025-07-25T17:34:41.318Z

Reserved: 2025-06-02T07:10:17.845Z

Link: CVE-2025-5449

cve-icon Vulnrichment

Updated: 2025-07-25T17:34:02.421Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-25T18:15:26.967

Modified: 2025-07-29T14:14:55.157

Link: CVE-2025-5449

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-06-24T00:00:00Z

Links: CVE-2025-5449 - Bugzilla