Описание
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1:7.3p1-2 |
| devel | not-affected | 1:7.3p1-2 |
| esm-infra-legacy/trusty | ignored | |
| esm-infra/xenial | ignored | |
| precise | ignored | end of life |
| precise/esm | ignored | |
| trusty | ignored | |
| trusty/esm | ignored | |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | ignored | end of life |
Показывать по
EPSS
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through ...
** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.8 High
CVSS2
7.5 High
CVSS3