CVE-2025-4877
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-20
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| libssh | libssh | 0.11.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the libssh package where passing an unexpectedly large input buffer to the ssh_get_fingerprint_hash() function causes the bin_to_base64() function to experience an integer overflow. This overflow leads to memory under allocation, which can result in out of bounds writes and heap corruption. It affects only 32-bit builds of libssh.
How can this vulnerability impact me? :
The vulnerability can lead to heap corruption due to out of bounds writes, which may cause the affected program to crash or behave unpredictably. This could potentially be exploited to compromise the integrity or availability of the system running the vulnerable libssh 32-bit build.