VYPR
Unrated severityOSV Advisory· Published Jul 25, 2025· Updated Jan 8, 2026

Libssh: integer overflow in libssh sftp server packet length validation leading to denial of service

CVE-2025-5449

Description

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

Affected products

2
  • Libssh/LibsshOSV2 versions
    libssh-0.11.0, libssh-0.11.1, libssh-0.8.0, …+ 1 more
    • (no CPE)range: libssh-0.11.0, libssh-0.11.1, libssh-0.8.0, …
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.