
We found results for “”
CVE-2025-8277
Good to know:


Date: September 9, 2025
A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.
Severity Score
Severity Score
Weakness Type (CWE)
Missing Release of Memory after Effective Lifetime
CWE-401Top Fix

Upgrade Version
Upgrade to version https://git.libssh.org/projects/libssh.git - libssh-0.11.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | LOW |