5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Openssh: denial-of-service in openssh
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
References
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://seclists.org/oss-sec/2025/q1/144
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://seclists.org/oss-sec/2025/q1/144
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://seclists.org/oss-sec/2025/q1/144
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- http://seclists.org/fulldisclosure/2025/May/8
- http://seclists.org/fulldisclosure/2025/May/7
- http://seclists.org/fulldisclosure/2025/Feb/18
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://seclists.org/oss-sec/2025/q1/144
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://ubuntu.com/security/CVE-2025-26466
- http://seclists.org/fulldisclosure/2025/May/8
- http://seclists.org/fulldisclosure/2025/May/7
- http://seclists.org/fulldisclosure/2025/Feb/18
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
- RHBZ#2345043 issue-tracking x_refsource_REDHAT
- https://seclists.org/oss-sec/2025/q1/144
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt
- https://access.redhat.com/security/cve/CVE-2025-26466 x_refsource_REDHAT vdb-entry
- https://ubuntu.com/security/CVE-2025-26466
- http://seclists.org/fulldisclosure/2025/May/8
- http://seclists.org/fulldisclosure/2025/May/7
- http://seclists.org/fulldisclosure/2025/Feb/18
- https://www.vicarius.io/vsociety/posts/cve-2025-26466-detection-script-memory-c…
- https://www.vicarius.io/vsociety/posts/cve-2025-26466-mitigation-script-memory-…
- https://security.netapp.com/advisory/ntap-20250228-0002/
- https://www.openwall.com/lists/oss-security/2025/02/18/1
- https://www.openwall.com/lists/oss-security/2025/02/18/4
- https://bugzilla.suse.com/show_bug.cgi?id=1237041
- https://security-tracker.debian.org/tracker/CVE-2025-26466
- https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt exploit
Affected products
- =<9.9p1
Matching in nixpkgs
pkgs.opensshTest
Implementation of the SSH protocol
-
nixos-unstable -
- nixpkgs-unstable 10.0p2
pkgs.openssh_hpn
Implementation of the SSH protocol with high performance networking patches
-
nixos-unstable -
- nixpkgs-unstable 10.0p2
pkgs.openssh_gssapi
Implementation of the SSH protocol with GSSAPI support
-
nixos-unstable -
- nixpkgs-unstable 10.0p2
pkgs.opensshWithKerberos
Implementation of the SSH protocol
-
nixos-unstable -
- nixpkgs-unstable 10.0p2
pkgs.openssh_hpnWithKerberos
Implementation of the SSH protocol with high performance networking patches
-
nixos-unstable -
- nixpkgs-unstable 10.0p2
pkgs.perlPackages.NetOpenSSH
Perl SSH client package implemented on top of OpenSSH
-
nixos-unstable -
- nixpkgs-unstable 0.84
pkgs.lxqt.lxqt-openssh-askpass
GUI to query passwords on behalf of SSH agents
-
nixos-unstable -
- nixpkgs-unstable 2.2.0
pkgs.perl538Packages.NetOpenSSH
Perl SSH client package implemented on top of OpenSSH
-
nixos-unstable -
- nixpkgs-unstable 0.84
pkgs.perl540Packages.NetOpenSSH
Perl SSH client package implemented on top of OpenSSH
-
nixos-unstable -
- nixpkgs-unstable 0.84
Package maintainers
-
@romildo José Romildo Malaquias <malaquias@gmail.com>
-
@philiptaron Philip Taron <philip.taron@gmail.com>
-
@helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de>
-
@dasJ Janne Heß <janne@hess.ooo>
-
@Conni2461 Simon Hauser <simon-hauser@outlook.com>
-
@numinit Morgan Jones <me+nixpkgs@numin.it>
-
@wahjava Ashish SHUKLA <ashish.is@lostca.se>