4.3 CVE-2025-32728
Patch
In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.
https://nvd.nist.gov/vuln/detail/CVE-2025-32728
Categories
CWE-440 : Expected Behavior Violation
A feature, API, or function does not perform according to its specification. Program uses large timeouts on unconfirmed connections resulting from inconsistency in linked lists implementations. "strncpy" in Linux kernel acts different than libc on x86, leading to expected behavior difference - sort of a multiple interpretation error? Buffer overflow in product stems the use of a third party library function that is expected to have internal protection against overflows, but doesn't.
CWE-NVD-noinfo
References
af854a3a-2127-422b-91ae-364da2661108
https://lists.debian.org/debian-lts-announce/2025/05/msg00008.html Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20250425-0002/ Third Party Advisory |
cve@mitre.org Patch
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | >= 7.4 | < 10.0 |
Configuration 2 | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b... |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.