Detection of Error Condition Without Action Affecting openssh package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
45.36% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-OPENSSH-10078688
  • published8 May 2025
  • disclosed18 Feb 2025
  • creditKevin Backhouse

Introduced: 18 Feb 2025

CVE-2025-26465  (opens in a new tab)
CWE-390  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Detection of Error Condition Without Action due to the mishandling of error codes when the VerifyHostKeyDNS option is enabled. An attacker can impersonate a legitimate server and potentially exhaust the client's memory resources by manipulating DNS responses.

CVSS Base Scores

version 4.0
version 3.1