Korean
<< Back
VID 14161
Severity 40
Port 22
Protocol TCP
Class SSH
Detailed Description The version of OpenSSH installed on the remote host is prior to 9.9p2. It is, therefore, affected by a vulnerability as referenced in the release-9.9p2 advisory.

- sshd(8) in OpenSSH versions 9.5p1 to 9.9p1 (inclusive) is vulnerable to a memory/CPU denial-of-service related to the handling of SSH2_MSG_PING packets. This condition may be mitigated using the existing PerSourcePenalties feature.(CVE-2025-26466)

* References:
https://www.openssh.com/txt/release-9.9p2

* Platforms Affected:
OpenSSH prior to 9.9p2
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of OpenSSH (9.9p2 or later), available from the OpenSSH Web site at https://www.openssh.org/
Related URL CVE-2025-26466 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)