CVE-2025-4877
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-20

Last updated on: 2025-08-20

Assigner: Red Hat, Inc.

Description
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-20
Last Modified
2025-08-20
Generated
2026-05-06
AI Q&A
2025-08-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
libssh libssh 0.11.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the libssh package where passing an unexpectedly large input buffer to the ssh_get_fingerprint_hash() function causes the bin_to_base64() function to experience an integer overflow. This overflow leads to memory under allocation, which can result in out of bounds writes and heap corruption. It affects only 32-bit builds of libssh.


How can this vulnerability impact me? :

The vulnerability can lead to heap corruption due to out of bounds writes, which may cause the affected program to crash or behave unpredictably. This could potentially be exploited to compromise the integrity or availability of the system running the vulnerable libssh 32-bit build.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart