
|
漏洞編號 |
CVE-2025-26465 CNNVD-202502-1940 |
軟件包 |
openssh |
|---|---|---|---|
|
CVSS評分 |
6.8 |
操作系統(tǒng) |
服務(wù)器V20-D版 |
|
系統(tǒng)版本 |
1050 |
系統(tǒng)架構(gòu) |
arm64 |
|
是否受影響 |
受影響 |
CWE編號 |
CWE-390 |
|
漏洞級別 |
中危 |
修復(fù)版本 |
1:7.9p1.19-deepin1 |
|
漏洞描述 |
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high. |
||
|
是否受影響判斷 |
執(zhí)行命令apt policy PackageName獲取軟件包版本號,版本小于修復(fù)版本,則受此漏洞影響,版本大于等于修復(fù)版本,則此漏洞已修復(fù) |
||
|
修復(fù)方式 |
sudo apt update && sudo apt dist-upgrade |
||
|
補丁包 |
先選擇系統(tǒng)版本,然后下載對應(yīng)架構(gòu)的軟件包: |
||
|
參考鏈接 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465 |
||
后續(xù)改善計劃
寶德計算機會持續(xù)跟進該漏洞的最新動態(tài),請關(guān)注寶德計算機官網(wǎng)、官微公告有任何關(guān)于此漏洞修復(fù)的問題,可以通過以下方式聯(lián)系我們:
寶德計算機售后咨詢熱線:4008-870-872
寶德PSIRT郵箱:psirt@powerleadercom.cn
寶德計算機官網(wǎng):http://www.powerleadercom.cn