Description
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6Attack Vector: Network
Complexity: Low
Privileges: Low
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: None
Availability: High
Affected Packages3 packages
🔴Vulnerability Details
4GHSAGHSA-q9x7-4rf7-4xq2: A flaw was found in the SFTP server message decoding logic of libssh↗2025-07-25 ▶ CVEListLibssh: integer overflow in libssh sftp server packet length validation leading to denial of service↗2025-07-25 ▶ OSVCVE-2025-5449: A flaw was found in the SFTP server message decoding logic of libssh↗2025-07-25 ▶ OSVlibssh vulnerabilities↗2025-07-07 ▶ 📋Vendor Advisories
3Ubuntulibssh vulnerabilities↗2025-07-07 ▶ Red Hatlibssh: Integer Overflow in libssh SFTP Server Packet Length Validation Leading to Denial of Service↗2025-06-24 ▶ DebianCVE-2025-5449: libssh - A flaw was found in the SFTP server message decoding logic of libssh. The issue ...↗2025 ▶