The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
[
{
"source": "https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97",
"id": "CVE-2016-6515-a7ac801a",
"deprecated": false,
"target": {
"function": "auth_password",
"file": "auth-passwd.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 1046.0,
"function_hash": "226840948738846026054403909505423905859"
}
},
{
"source": "https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97",
"id": "CVE-2016-6515-f74bc6a0",
"deprecated": false,
"target": {
"file": "auth-passwd.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"169366794320422204000709960000445355030",
"311121508538256338473633648009588614623",
"210215936786631902887231947746032519312",
"145147796172036403093771438374944323202",
"34022028665672401654215887975195649129",
"13648517431284205482544467659725921705",
"194613709597506156553679113958316693368"
]
}
}
]