EUVD-2025-20227

| CVE-2025-5987 HIGH
2025-07-07 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 16, 2026 - 03:37 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 03:37 euvd
EUVD-2025-20227
CVE Published
Jul 07, 2025 - 15:15 nvd
HIGH 8.1

Description

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.

Analysis

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library.

Technical Context

A denial of service vulnerability allows an attacker to disrupt the normal functioning of a system, making it unavailable to legitimate users. This vulnerability is classified as Return of Wrong Status Code (CWE-393).

Affected Products

Affected products: Libssh Libssh

Remediation

Implement rate limiting and input validation. Use timeout mechanisms for resource-intensive operations. Deploy DDoS protection where applicable.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +40
POC: 0

Vendor Status

Ubuntu

Priority: Medium
libssh
Release Status Version
noble released 0.10.6-2ubuntu0.1
oracular released 0.10.6-3ubuntu1.1
plucky released 0.11.1-1ubuntu0.1
upstream released 0.11.2
bionic not-affected code not present
focal not-affected code not present
jammy not-affected code not present
xenial not-affected code not present

Debian

Bug #1108407
libssh
Release Status Fixed Version Urgency
bullseye not-affected - -
bullseye (security) fixed 0.9.8-0+deb11u2 -
bookworm fixed 0.10.6-0+deb12u2 -
bookworm (security) vulnerable 0.10.6-0+deb12u1 -
trixie fixed 0.11.2-1+deb13u1 -
forky fixed 0.11.3-1 -
sid fixed 0.12.0-1 -
(unstable) fixed 0.11.2-1 -

Share

EUVD-2025-20227 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy