VID |
14161 |
Severity |
40 |
Port |
22 |
Protocol |
TCP |
Class |
SSH |
Detailed Description |
The version of OpenSSH installed on the remote host is prior to 9.9p2. It is, therefore, affected by a vulnerability as referenced in the release-9.9p2 advisory.
- sshd(8) in OpenSSH versions 9.5p1 to 9.9p1 (inclusive) is vulnerable to a memory/CPU denial-of-service related to the handling of SSH2_MSG_PING packets. This condition may be mitigated using the existing PerSourcePenalties feature.(CVE-2025-26466)
* References: https://www.openssh.com/txt/release-9.9p2
* Platforms Affected: OpenSSH prior to 9.9p2 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of OpenSSH (9.9p2 or later), available from the OpenSSH Web site at https://www.openssh.org/ |
Related URL |
CVE-2025-26466 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|