The API function `ssh_get_hexa()` is vulnerable, when 0-lenght
input is provided to this function. This function is used internally
in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated),
which is vulnerable to the same input (length is provided by the
calling application).
The function is also used internally in the gssapi code for logging
the OIDs received by the server during GSSAPI authentication. This
could be triggered remotely, when the server allows GSSAPI authentication
and logging verbosity is set at least to SSH_LOG_PACKET (3). This
could cause self-DoS of the per-connection daemon process.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-26 21:17
Updated : 2026-03-30 13:26
NVD link : CVE-2026-0966
Mitre link : CVE-2026-0966
CVE.ORG link : CVE-2026-0966
JSON object : View
Products Affected
No product.
CWE
CWE-124
Buffer Underwrite ('Buffer Underflow')
