CVE-2025-4877 – Libssh Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the
CVE-2025-4877 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 20, 2025

    Action Type Old Value New Value
    Added Description There’s a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it’s possible that the program perform out of bounds write leading to a heap corruption.
    This issue affects only 32-bits builds of libssh.
    Added CVSS V3.1 AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
    Added CWE CWE-787
    Added Reference https://access.redhat.com/security/cve/CVE-2025-4877
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2376193
    Added Reference https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=6fd9cc8ce3958092a1aae11f1f2e911b2747732d
    Added Reference https://www.libssh.org/security/advisories/CVE-2025-4877.txt
Share the Post:

Related Posts