CVE-2025-4877

Name
CVE-2025-4877
Description
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vdb-entry https://access.redhat.com/security/cve/CVE-2025-4877
issue-tracking https://bugzilla.redhat.com/show_bug.cgi?id=2376193
secalert@redhat.com https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=6fd9cc8ce3958092a1aae11f1f2e911b2747732d
secalert@redhat.com https://www.libssh.org/security/advisories/CVE-2025-4877.txt

Match rules

CPE URI Source package Min version Max version
shopxo >= 0 < 0.11.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libssh edge-community 0.11.2-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
libssh 3.22-community 0.11.2-r0 Natanael Copa <ncopa@alpinelinux.org> fixed