Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5449: Integer Overflow or Wraparound

0
Medium
VulnerabilityCVE-2025-5449cvecve-2025-5449
Published: Fri Jul 25 2025 (07/25/2025, 17:19:39 UTC)
Source: CVE Database V5

Description

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:18:57 UTC

Technical Analysis

CVE-2025-5449 is a medium severity vulnerability affecting libssh version 0.11.0, specifically in the SFTP server's message decoding logic. The root cause is an integer overflow or wraparound due to an incorrect packet length check when handling large payload sizes on 32-bit architectures. In such environments, the packet length value can exceed the maximum integer size, causing the length calculation to wrap around to a smaller number. This leads to improper memory allocation attempts that fail, resulting in the server process crashing and causing a denial of service. The vulnerability can be triggered remotely over the network without requiring user interaction, but it does require low-level privileges on the server. The flaw does not impact confidentiality or integrity but severely affects availability by crashing the SFTP service. No known exploits have been reported in the wild as of the publication date. The issue highlights the importance of careful input validation and boundary checks in network protocol implementations, especially on systems with limited integer size. The vulnerability was assigned a CVSS 3.1 base score of 6.5, reflecting its medium severity and network attack vector with low complexity.

Potential Impact

The primary impact of CVE-2025-5449 is denial of service against SFTP servers using libssh 0.11.0 on 32-bit systems. A successful exploit causes the server process to crash, disrupting file transfer services and potentially affecting dependent applications or workflows. This can lead to operational downtime, loss of availability of critical data transfer services, and increased support costs. While the vulnerability does not allow data theft or code execution, the DoS condition can be leveraged as part of a larger attack chain to degrade system reliability or availability. Organizations relying on libssh for secure file transfers, especially those with legacy 32-bit infrastructure, are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future weaponization. The vulnerability could be exploited by attackers with network access and low privileges, making it feasible in many environments.

Mitigation Recommendations

To mitigate CVE-2025-5449, organizations should prioritize upgrading libssh to a version where this integer overflow flaw is fixed once the patch is released. In the interim, administrators should restrict network access to the SFTP service using firewalls or access control lists to limit exposure. Implementing strict input validation and enforcing maximum packet size limits at the application or network level can help prevent large payloads from triggering the overflow. Monitoring server logs and crash reports can aid in early detection of exploitation attempts. For environments that must continue using libssh 0.11.0 on 32-bit systems, consider deploying SFTP services on 64-bit systems where the integer overflow does not occur. Additionally, employing process supervision and automatic restart mechanisms can reduce downtime caused by crashes. Regular vulnerability scanning and patch management processes should be maintained to ensure timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-02T07:10:17.845Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6883bfbdad5a09ad00545182

Added to database: 7/25/2025, 5:32:45 PM

Last enriched: 2/27/2026, 3:18:57 PM

Last updated: 3/25/2026, 1:48:59 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses