CVE Vulnerabilities

CVE-2025-26465

Detection of Error Condition Without Action

Published: Feb 18, 2025 | Modified: Feb 19, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.8 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the clients memory resource first, turning the attack complexity high.

Weakness

The product detects a specific error, but takes no actions to handle the error.

Affected Software

Name Vendor Start Version End Version
Openssh Ubuntu devel *
Openssh Ubuntu esm-infra/bionic *
Openssh Ubuntu esm-infra/xenial *
Openssh Ubuntu fips-preview/jammy *
Openssh Ubuntu fips-updates/bionic *
Openssh Ubuntu fips-updates/focal *
Openssh Ubuntu fips-updates/jammy *
Openssh Ubuntu fips-updates/xenial *
Openssh Ubuntu fips/bionic *
Openssh Ubuntu fips/focal *
Openssh Ubuntu fips/xenial *
Openssh Ubuntu focal *
Openssh Ubuntu jammy *
Openssh Ubuntu noble *
Openssh Ubuntu oracular *
Openssh-ssh1 Ubuntu devel *
Openssh-ssh1 Ubuntu esm-apps/bionic *
Openssh-ssh1 Ubuntu esm-apps/focal *
Openssh-ssh1 Ubuntu esm-apps/jammy *
Openssh-ssh1 Ubuntu esm-apps/noble *
Openssh-ssh1 Ubuntu focal *
Openssh-ssh1 Ubuntu jammy *
Openssh-ssh1 Ubuntu noble *
Openssh-ssh1 Ubuntu oracular *
Openssh-ssh1 Ubuntu upstream *

Potential Mitigations

References