Bug 2369705 (CVE-2025-5449) - CVE-2025-5449 libssh: Integer Overflow in libssh SFTP Server Packet Length Validation Leading to Denial of Service
Summary: CVE-2025-5449 libssh: Integer Overflow in libssh SFTP Server Packet Length Va...
Keywords:
Status: NEW
Alias: CVE-2025-5449
Deadline: 2025-06-24
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-02 07:13 UTC by OSIDB Bzimport
Modified: 2025-07-04 05:23 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-02 07:13:03 UTC
Integer Overflow vulnerability in the SFTP server implementation of libssh. The flaw exists in the sftp_decode_channel_data_to_packet() function, where a crafted packet with a large payload size (e.g., 0x7ffffffc) bypasses a validity check due to integer overflow on 32-bit platforms. While this does not lead to direct memory corruption, the failure to allocate the excessively large buffer results in a self-induced denial of service (DoS). This issue can only be exploited by authenticated users with SFTP access and affects servers running on 32-bit systems.

Affected versions: libssh 0.11.0 and 0.11.1


Note You need to log in before you can comment on or make changes to this bug.