Описание
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1:7.5p1-10ubuntu0.1 |
| bionic | not-affected | 1:7.5p1-10 |
| cosmic | not-affected | 1:7.5p1-10 |
| devel | not-affected | 1:7.5p1-10 |
| disco | not-affected | 1:7.5p1-10 |
| eoan | not-affected | 1:7.5p1-10 |
| esm-infra-legacy/trusty | released | 1:6.6p1-2ubuntu2.11 |
| esm-infra/bionic | not-affected | 1:7.5p1-10 |
| esm-infra/focal | not-affected | 1:7.5p1-10 |
| esm-infra/xenial | released | 1:7.2p2-4ubuntu2.6 |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial o ...
5 Medium
CVSS2
7.5 High
CVSS3