CVE-2025-26466
متوسطة / Medium
CVSS 5.9
VULNERABILITY BRIEF
CVE-2025-26466
المصدر الرسمي: NVD
مستوى الخطورة
متوسطة (Medium)
درجة CVSS
5.9
حالة الاستغلال KEV
غير مدرجة حاليًا
تاريخ النشر
2025-03-01
وصف الثغرة
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
الأثر المحتمل
لم تتوفر تفاصيل إضافية في المصدر الرسمي.
التوصيات والمعالجة
لم تتوفر تفاصيل إضافية في المصدر الرسمي.\nراجع روابط المصدر الرسمية.
حالة الاستغلال (KEV)
لا يوجد إدراج حاليًا في قائمة KEV.
المراجع الرسمية
- https://access.redhat.com/security/cve/CVE-2025-26466
- https://bugzilla.redhat.com/show_bug.cgi?id=2345043
- https://seclists.org/oss-sec/2025/q1/144
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- http://seclists.org/fulldisclosure/2025/Feb/18
- http://seclists.org/fulldisclosure/2025/May/7
- http://seclists.org/fulldisclosure/2025/May/8
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://ubuntu.com/security/CVE-2025-26466
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://www.vicarius.io/vsociety/posts/cve-2025-26466-detection-script-memory-consumption-vulnerability-in-openssh
- https://www.vicarius.io/vsociety/posts/cve-2025-26466-mitigation-script-memory-consumption-vulnerability-in-openssh
English Technical Fields
Description: A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H