A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Metrics
Affected Vendors & Products
References
History
Sat, 22 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 |
Fri, 21 Mar 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Canonical
Canonical ubuntu Linux Debian Debian debian Linux Openbsd Openbsd openssh |
|
CPEs | cpe:2.3:a:openbsd:openssh:9.5:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.6:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.7:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.8:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Canonical
Canonical ubuntu Linux Debian Debian debian Linux Openbsd Openbsd openssh |
Fri, 21 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-770 |
Wed, 05 Mar 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 04 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 28 Feb 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | openssh: Denial-of-service in OpenSSH | Openssh: denial-of-service in openssh |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Wed, 19 Feb 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. | |
Title | openssh: Denial-of-service in OpenSSH | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-02-28T21:25:28.861Z
Updated: 2025-03-21T15:57:02.215Z
Reserved: 2025-02-10T18:31:47.979Z
Link: CVE-2025-26466

Updated: 2025-03-05T03:48:43.236Z

Status : Modified
Published: 2025-02-28T22:15:40.080
Modified: 2025-03-21T16:15:18.677
Link: CVE-2025-26466
