CVE-2026-0966

high

Description

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

References

https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/

https://bugzilla.redhat.com/show_bug.cgi?id=2433121

https://access.redhat.com/security/cve/CVE-2026-0966

https://access.redhat.com/errata/RHSA-2026:7067

Details

Source: Mitre, NVD

Published: 2026-03-26

Updated: 2026-04-30

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C

Severity: High

CVSS v3

Base Score: 8.2

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Severity: High

EPSS

EPSS: 0.00086