Potential stack buffer overwrite on the SFTP server side when receiving a malicious packet that has a handle size larger than the system handle or file descriptor size, but smaller than max handle size allowed.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://github.com/wolfSSL/wolfssh/pull/834 |
![]() ![]() |
History
Tue, 21 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 21 Oct 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Potential stack buffer overwrite on the SFTP server side when receiving a malicious packet that has a handle size larger than the system handle or file descriptor size, but smaller than max handle size allowed. | |
Title | Buffer overwrite when processing file handles with the SFTP server | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2025-10-21T14:08:16.924Z
Reserved: 2025-10-10T21:06:44.670Z
Link: CVE-2025-11624

Updated: 2025-10-21T13:41:21.140Z

Status : Received
Published: 2025-10-21T14:15:46.813
Modified: 2025-10-21T14:15:46.813
Link: CVE-2025-11624

No data.

No data.