Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2379 articles · 112022 vulns · 38/41 feeds (7d)
← Back to list
6.5
CVE-2026-0966
red hat · red hat enterprise linux

Libssh: buffer underflow in ssh_get_hexa() on invalid input

Description

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

Affected Products

VendorProductVersions
red hatred hat enterprise linux—

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
canonicalubuntu linuxcert_advisory90%
meinberglantimecert_advisory90%
open sourcelibsshcert_advisory90%
sulinuxcert_advisory90%

References

  • https://access.redhat.com/security/cve/CVE-2026-0966(vdb-entry, x_refsource_REDHAT)
  • https://bugzilla.redhat.com/show_bug.cgi?id=2433121(issue-tracking, x_refsource_REDHAT)
  • https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/

Related News (2 articles)

Tier B
BSI Advisories6d ago
[UPDATE] [mittel] libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS
→ No new info (linked only)
Tier A
Microsoft MSRC20d ago
CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input
→ No new info (linked only)
CVSS 3.16.5 NONE
CISA KEV❌ No
Actively exploited❌ No
CWECWE-124
PublishedMar 26, 2026
Last enriched19d ago
Trending Score20
Source articles2
Independent2
Info Completeness5/14
Missing: vendor, product, versions, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHPRE-CVE
Multiple Vulnerabilities in Red Hat Hardened Images RPMs (jq and pyOpenSSL)
Trending: 27
NONECVE-2026-40915
Gimp: gimp: heap buffer overflow due to integer overflow in fits image loader
Trending: 19
MEDIUMCVE-2026-6383EXP
Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation
Trending: 19
NONECVE-2026-4424
Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing
Trending: 17
MEDIUMCVE-2026-37980
Org.keycloak.forms.login: keycloak: keycloak: arbitrary code execution via stored cross-site scripting (xss) in organization selection login page
Trending: 17

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 26, 2026
Discovered by ZDM
Apr 1, 2026