CVE-2025-26466

EUVD-2025-5920
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
openbsdopenssh
9.5:p1
openbsdopenssh
9.6
openbsdopenssh
9.6:p1
openbsdopenssh
9.7
openbsdopenssh
9.7:p1
openbsdopenssh
9.8
openbsdopenssh
9.8:p1
openbsdopenssh
9.9
openbsdopenssh
9.9:p1
canonicalubuntu_linux
24.04
canonicalubuntu_linux
24.10
debiandebian_linux
11.0
debiandebian_linux
12.0
debiandebian_linux
13.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssh
bookworm
1:9.2p1-2+deb12u7
fixed
bookworm (security)
1:9.2p1-2+deb12u9
fixed
bullseye
1:8.4p1-5+deb11u3
fixed
bullseye (security)
1:8.4p1-5+deb11u6
fixed
forky
1:10.2p1-6
fixed
sid
1:10.3p1-1
fixed
trixie
1:10.0p1-7+deb13u1
fixed
trixie (security)
1:10.0p1-7+deb13u2
fixed