Home / CVE DB / CVE-2025-5318
Standard
Vulnerability Identifier

CVE-2025-5318

2025-06-24
Severity Assessment
8.1
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
None
Integrity
High
Availability
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Weakness Classification

CWE-CWE-125

Affected Population

Affected Configurations

Total: 54 detected entries

Software List Scrollable
li
libssh
Vendor: libssh • v0.7.4
re
enterprise_linux
Vendor: redhat • v8.0
li
libssh
Vendor: libssh • v0.10.2
li
libssh
Vendor: libssh • v0.6.2
li
libssh
Vendor: libssh • v0.8.0
li
libssh
Vendor: libssh • v0.5.2
li
libssh
Vendor: libssh • v0.8.6
li
libssh
Vendor: libssh • v0.8.1
li
libssh
Vendor: libssh • v0.6.4
li
libssh
Vendor: libssh • v0.7.0
re
enterprise_linux
Vendor: redhat • v10.0
li
libssh
Vendor: libssh • v0.11.0
li
libssh
Vendor: libssh • v0.7.2
li
libssh
Vendor: libssh • v0.9.2
li
libssh
Vendor: libssh • v0.9.3
li
libssh
Vendor: libssh • v0.8.5
li
libssh
Vendor: libssh • v0.7.3
li
libssh
Vendor: libssh • v0.9.4
li
libssh
Vendor: libssh • v0.4.7
li
libssh
Vendor: libssh • v0.9.6
li
libssh
Vendor: libssh • v0.8.7
li
libssh
Vendor: libssh • v0.5.4
li
libssh
Vendor: libssh • v0.10.0
li
libssh
Vendor: libssh • v0.8.2
li
libssh
Vendor: libssh • v0.8.8
li
libssh
Vendor: libssh • v0.8.4
li
libssh
Vendor: libssh • v0.8.9
li
libssh
Vendor: libssh • v0.6.5
li
libssh
Vendor: libssh • v0.7.6
li
libssh
Vendor: libssh • v0.9.7
li
libssh
Vendor: libssh • v0.5.0
li
libssh
Vendor: libssh • v0.6.3
li
libssh
Vendor: libssh • v0.6.0
li
libssh
Vendor: libssh • v0.10.1
li
libssh
Vendor: libssh • v0.7.7
li
libssh
Vendor: libssh • v0.5.3
li
libssh
Vendor: libssh • v0.10.5
li
libssh
Vendor: libssh • v0.4.8
li
libssh
Vendor: libssh • v0.5.5
li
libssh
Vendor: libssh • v0.9.5
li
libssh
Vendor: libssh • v0.9.8
li
libssh
Vendor: libssh • v0.5.1
li
libssh
Vendor: libssh • v0.6.1
li
libssh
Vendor: libssh • v0.11.1
li
libssh
Vendor: libssh • v0.10.4
li
libssh
Vendor: libssh • v0.7.1
re
openshift_container_platform
Vendor: redhat • v4.0
li
libssh
Vendor: libssh • v0.8.3
li
libssh
Vendor: libssh • v0.9.0
li
libssh
Vendor: libssh • v0.10.6
li
libssh
Vendor: libssh • v0.7.5
li
libssh
Vendor: libssh • v0.9.1
re
enterprise_linux
Vendor: redhat • v9.0
li
libssh
Vendor: libssh • v0.10.3
Timeline

Time Line

PUBLICATION
24 Jun 2025
MODIFICATION
27 Feb 2026
FIRST PATCH
21 Apr 2026
Impact Statistics

Key Metrics

CVSS Score
8.1
HIGH
Products
54
Affected
Patches
6
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.