Wiz Agents & Workflows are here

CVE-2025-4877
Wolfi vulnerability analysis and mitigation

Overview

CVE-2025-4877 is a vulnerability discovered in the libssh package affecting all versions on 32-bit architectures. The vulnerability was discovered by Ronald Crane and publicly disclosed on June 25, 2025. The issue occurs when a libssh consumer passes an unexpectedly large input buffer to the ssh_get_fingerprint_hash() function, which can lead to an integer overflow in the bin_to_base64() function (LibSSH Advisory).

Technical details

The vulnerability stems from an integer overflow condition in the bin_to_base64() function located in src/base64.c. When processing large input buffers on 32-bit architectures, this overflow leads to memory under allocation, potentially resulting in out-of-bounds write operations and heap corruption. The issue specifically manifests when the ssh_get_fingerprint_hash() API is misused with unexpectedly large input buffers. The vulnerability has been assigned a CVSS 3.1 base score of 4.5 (Medium) with vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L (Ubuntu CVE).

Impact

The exploitation of this vulnerability could lead to multiple security implications including denial of service through application crashes, potential arbitrary code execution, and possible heap corruption. The impact is particularly significant on 32-bit systems where the integer overflow condition can be triggered (Ubuntu USN).

Mitigation and workarounds

As a mitigation, the bin_to_base64() function has been modified to reject inputs larger than 256MB, aligning with other input processing functions. The vulnerability has been fixed in multiple Linux distributions with updated package versions. For Ubuntu, fixes are available in versions 0.11.1-1ubuntu0.1 (25.04), 0.10.6-3ubuntu1.1 (24.10), 0.10.6-2ubuntu0.1 (24.04 LTS), and 0.9.6-2ubuntu0.22.04.4 (22.04 LTS). As a workaround, users should ensure that ssh_get_fingerprint_hash() is not used to encode arbitrary buffers larger than 1GB on 32-bit architectures (Ubuntu USN, LibSSH Advisory).

Additional resources


SourceThis report was generated using AI

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34040HIGH8.8
  • cAdvisorcAdvisor
  • docker-fips-29
NoYesMar 31, 2026
CVE-2026-33987HIGH7.1
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33997MEDIUM6.8
  • cAdvisorcAdvisor
  • docker
NoYesMar 31, 2026
CVE-2026-33995MEDIUM5.3
  • WolfiWolfi
  • libwinpr
NoYesMar 30, 2026
CVE-2026-34073LOW1.7
  • PythonPython
  • apache-beam-python-3.13-sdk
NoYesMar 31, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management