Description
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
Problem types
Integer Overflow or Wraparound
Product status
0.11.0 (semver)
Timeline
| 2025-06-02: | Reported to Red Hat. |
| 2025-06-24: | Made public. |
Credits
Red Hat would like to thank Ronald Crane for reporting this issue.
References
access.redhat.com/security/cve/CVE-2025-5449
bugzilla.redhat.com/show_bug.cgi?id=2369705 (RHBZ#2369705)
git.libssh.org/...d=261612179f740bc62ba363d98b3bd5e5573a811f
git.libssh.org/...d=3443aec90188d6aab9282afc80a81df5ab72c4da
git.libssh.org/...d=5504ff40515439a5fecbb17da7483000c4d12eb7
git.libssh.org/...d=78485f446af9b30e37eb8f177b81940710d54496
git.libssh.org/...d=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb