We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5449

Libssh: integer overflow in libssh sftp server packet length validation leading to denial of service



Description

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

Reserved 2025-06-02 | Published 2025-07-25 | Updated 2025-07-25 | Assigner redhat


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem types

Integer Overflow or Wraparound

Product status

Default status
unaffected

0.11.0
affected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2025-06-02:Reported to Red Hat.
2025-06-24:Made public.

Credits

Red Hat would like to thank Ronald Crane for reporting this issue.

References

access.redhat.com/security/cve/CVE-2025-5449 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2369705 (RHBZ#2369705) issue-tracking

git.libssh.org/...d=261612179f740bc62ba363d98b3bd5e5573a811f

git.libssh.org/...d=3443aec90188d6aab9282afc80a81df5ab72c4da

git.libssh.org/...d=5504ff40515439a5fecbb17da7483000c4d12eb7

git.libssh.org/...d=78485f446af9b30e37eb8f177b81940710d54496

git.libssh.org/...d=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb

www.libssh.org/security/advisories/CVE-2025-5449.txt

cve.org (CVE-2025-5449)

nvd.nist.gov (CVE-2025-5449)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5449

Support options

Helpdesk Chat, Email, Knowledgebase