CVE-2025-5318
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-24

Last updated on: 2026-02-27

Assigner: Red Hat, Inc.

Description
A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-24
Last Modified
2026-02-27
Generated
2026-05-07
AI Q&A
2025-06-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 8.0
redhat openshift_container_platform 4.0
redhat enterprise_linux 9.0
redhat enterprise_linux 10.0
libssh libssh From 0.10.0 (inc) to 0.11.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds read flaw in the libssh library's sftp_handle() function. Due to an incorrect boundary check, the function can access memory beyond the valid handle list and return an invalid pointer. This pointer is then used in further processing, which can lead to reading unintended memory regions. Exploitation requires an attacker to be authenticated on the server. [1]


How can this vulnerability impact me? :

If exploited by an authenticated remote attacker, this vulnerability can allow reading of unintended memory regions, potentially exposing sensitive information or affecting the behavior of the service running the vulnerable libssh version. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves ensuring that the libssh library on your systems is updated to a version that fixes this out-of-bounds read vulnerability in the sftp_handle() function. Since exploitation requires authenticated access, restricting access to the SFTP service and monitoring for unusual authenticated activity can help reduce risk until patches are applied. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart