Description

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

INFO

Published Date :

2025-02-28T21:25:28.861Z

Last Modified :

2026-02-10T17:13:57.386Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-26466 vulnerability.

Vendors Products
Canonical
  • Ubuntu Linux
Debian
  • Debian Linux
Openbsd
  • Openssh
Redhat
  • Enterprise Linux
  • Openshift

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact