4.3 CVE-2025-32728

Patch
 

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.
https://nvd.nist.gov/vuln/detail/CVE-2025-32728

Categories

CWE-440 : Expected Behavior Violation
A feature, API, or function does not perform according to its specification. Program uses large timeouts on unconfirmed connections resulting from inconsistency in linked lists implementations. "strncpy" in Linux kernel acts different than libc on x86, leading to expected behavior difference - sort of a multiple interpretation error? Buffer overflow in product stems the use of a third party library function that is expected to have internal protection against overflows, but doesn't.

CWE-NVD-noinfo

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* >= 7.4 < 10.0
Configuration 2
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry