Описание
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Отчет
The versions of OpenSSH as shipped with Red Hat Enterprise Linux 9 and older, and Red Hat Enterprise Linux CoreOS are not affected by this vulnerability as the OpenSSH versions distributed with those products are based on previous versions of OpenSSH's version that introduced the issue (openssh-9.5p1 upstream version). Also this issue marked as a moderate severity vulnerability rather than important because, while it enables a pre-authentication denial-of-service (DoS) attack, it does not allow remote code execution, privilege escalation, or data exfiltration. The attack is asymmetric in resource consumption, meaning an attacker can force excessive CPU and memory usage, but it still requires repeated connection attempts to sustain the impact. Moreover, OpenSSH provides built-in mitigation mechanisms, such as LoginGraceTime, MaxStartups, and PerSourcePenalties, which can significantly limit the attack’s effectiveness if properly configured.
Меры по смягчению последствий
This issue can be mitigated by setting the following three different options in the sshd configuration file located at: /etc/ssh/sshd_config MaxStartups: Set to a reasonable value, this option controls the maximum number of concurrent unauthenticated connections the SSH server accepts; PerSourcePenalties: Set its suboptions to a reasonable value, this option is used to help sshd to detect and drop connections that are potentially malicious for the SSH server; LoginGraceTime: Set to a resonable value, this option controls how much time the SSH server will wait the client to authenticate before dropping its connection; All the three option above needs to be set to implement a full mitigation for this vulnerability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | openssh | Not affected | ||
Red Hat Enterprise Linux 6 | openssh | Not affected | ||
Red Hat Enterprise Linux 7 | openssh | Not affected | ||
Red Hat Enterprise Linux 8 | openssh | Not affected | ||
Red Hat Enterprise Linux 9 | openssh | Not affected | ||
Red Hat OpenShift Container Platform 4 | rhcos | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
A flaw was found in the OpenSSH package. For each ping packet the SSH ...
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
EPSS
5.9 Medium
CVSS3