Potential stack buffer overwrite on the SFTP server side when receiving a malicious packet that has a handle size larger than the system handle or file descriptor size, but smaller than max handle size allowed.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssh/pull/834 |
|
History
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssh
Wolfssh wolfssh |
|
| Vendors & Products |
Wolfssh
Wolfssh wolfssh |
Tue, 21 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Potential stack buffer overwrite on the SFTP server side when receiving a malicious packet that has a handle size larger than the system handle or file descriptor size, but smaller than max handle size allowed. | |
| Title | Buffer overwrite when processing file handles with the SFTP server | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published: 2025-10-21T13:14:19.625Z
Updated: 2025-10-21T14:08:16.924Z
Reserved: 2025-10-10T21:06:44.670Z
Link: CVE-2025-11624
Updated: 2025-10-21T13:41:21.140Z
Status : Awaiting Analysis
Published: 2025-10-21T14:15:46.813
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-11624
No data.