The kexinputkexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
{
"isDisputed": true
}[
{
"deprecated": false,
"source": "https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad",
"id": "CVE-2016-8858-2d5da5dc",
"signature_version": "v1",
"target": {
"file": "kex.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"156902939790282373310700724171657588209",
"316380331125517353126913904911828465574",
"295105781540324081782822153413707735107",
"244003011357174172644176527148363962509"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad",
"id": "CVE-2016-8858-dfa55b22",
"signature_version": "v1",
"target": {
"function": "kex_input_kexinit",
"file": "kex.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "235425802652287821391024408040613178504",
"length": 1030.0
}
}
]