Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2025-5987 | First vendor Publication | 2025-07-07 |
Vendor | Cve | Last vendor Modification | 2025-07-07 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L | |||
---|---|---|---|
Overall CVSS Score | 5 | ||
Base Score | 5 | Environmental Score | 5 |
impact SubScore | 3.4 | Temporal Score | 5 |
Exploitabality Sub Score | 1.6 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | Low |
Integrity Impact | Low | Availability Impact | Low |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5987 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-393 | Return of Wrong Status Code |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-07-07 21:20:37 |
|