Detection of Error Condition Without Action Affecting openssh-portable package, versions [,9.9p2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-OPENSSHPORTABLE-8734203
  • published19 Feb 2025
  • disclosed18 Feb 2025
  • creditKevin Backhouse

Introduced: 18 Feb 2025

NewCVE-2025-26465  (opens in a new tab)
CWE-390  (opens in a new tab)

How to fix?

Upgrade openssh-portable to version 9.9p2 or higher.

Overview

Affected versions of this package are vulnerable to Detection of Error Condition Without Action due to the mishandling of error codes when the VerifyHostKeyDNS option is enabled. An attacker can impersonate a legitimate server and potentially exhaust the client's memory resources by manipulating DNS responses.

CVSS Scores

version 4.0
version 3.1