The kexinputkexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
{
"isDisputed": true
}[
{
"id": "CVE-2016-8858-2d5da5dc",
"digest": {
"threshold": 0.9,
"line_hashes": [
"156902939790282373310700724171657588209",
"316380331125517353126913904911828465574",
"295105781540324081782822153413707735107",
"244003011357174172644176527148363962509"
]
},
"deprecated": false,
"source": "https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad",
"target": {
"file": "kex.c"
},
"signature_version": "v1",
"signature_type": "Line"
},
{
"id": "CVE-2016-8858-dfa55b22",
"digest": {
"length": 1030.0,
"function_hash": "235425802652287821391024408040613178504"
},
"deprecated": false,
"source": "https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad",
"target": {
"file": "kex.c",
"function": "kex_input_kexinit"
},
"signature_version": "v1",
"signature_type": "Function"
}
]