{"id":"CVE-2025-4877","details":"There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption.\nThis issue affects only 32-bits builds of libssh.","modified":"2026-04-10T05:28:49.999309Z","published":"2025-08-20T13:15:28Z","related":["SUSE-SU-2025:02229-1","SUSE-SU-2025:02278-1","SUSE-SU-2025:02279-1","SUSE-SU-2025:02281-1","SUSE-SU-2025:02755-1","SUSE-SU-2025:20557-1","SUSE-SU-2025:20596-1","openSUSE-SU-2025:15243-1"],"references":[{"type":"ADVISORY","url":"https://www.libssh.org/security/advisories/CVE-2025-4877.txt"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376193"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-4877"},{"type":"WEB","url":"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=6fd9cc8ce3958092a1aae11f1f2e911b2747732d"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}