The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that OpenSSH upstream does not consider this as a security issue.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openssh | Openbsd | 6.8 (including) | 6.8 (including) |
Openssh | Openbsd | 6.9 (including) | 6.9 (including) |
Openssh | Openbsd | 7.0 (including) | 7.0 (including) |
Openssh | Openbsd | 7.1 (including) | 7.1 (including) |
Openssh | Openbsd | 7.2 (including) | 7.2 (including) |
Openssh | Openbsd | 7.3 (including) | 7.3 (including) |
Openssh | Ubuntu | esm-infra-legacy/trusty | * |
Openssh | Ubuntu | esm-infra/xenial | * |
Openssh | Ubuntu | precise | * |
Openssh | Ubuntu | precise/esm | * |
Openssh | Ubuntu | trusty | * |
Openssh | Ubuntu | trusty/esm | * |
Openssh | Ubuntu | vivid/stable-phone-overlay | * |
Openssh | Ubuntu | vivid/ubuntu-core | * |
Openssh | Ubuntu | xenial | * |
Openssh | Ubuntu | yakkety | * |