The kexinputkexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
{ "isDisputed": true }
{ "vanir_signatures": [ { "id": "CVE-2016-8858-2d5da5dc", "source": "https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad", "signature_type": "Line", "deprecated": false, "target": { "file": "kex.c" }, "digest": { "line_hashes": [ "156902939790282373310700724171657588209", "316380331125517353126913904911828465574", "295105781540324081782822153413707735107", "244003011357174172644176527148363962509" ], "threshold": 0.9 }, "signature_version": "v1" }, { "id": "CVE-2016-8858-dfa55b22", "source": "https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad", "signature_type": "Function", "deprecated": false, "target": { "file": "kex.c", "function": "kex_input_kexinit" }, "digest": { "function_hash": "235425802652287821391024408040613178504", "length": 1030.0 }, "signature_version": "v1" } ] }