CVE-2025-4877 — Out-of-bounds Write in Libssh
Severity
4.5MEDIUMNVD
EPSS
0.0%
top 94.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 20
Description
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption.
This issue affects only 32-bits builds of libssh.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:LExploitability: 1.0 | Impact: 3.4
Affected Packages5 packages
🔴Vulnerability Details
4OSV▶
CVE-2025-4877: There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash()↗2025-08-20
GHSA▶
GHSA-pwrf-jm93-99r3: There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash()↗2025-08-20
📋Vendor Advisories
5Debian▶
CVE-2025-4877: libssh - There's a vulnerability in the libssh package where when a libssh consumer passe...↗2025