The kexinputkexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
{
"binaries": [
{
"binary_name": "openssh-client",
"binary_version": "1:6.6p1-2ubuntu2.13+esm2"
},
{
"binary_name": "openssh-server",
"binary_version": "1:6.6p1-2ubuntu2.13+esm2"
},
{
"binary_name": "openssh-sftp-server",
"binary_version": "1:6.6p1-2ubuntu2.13+esm2"
},
{
"binary_name": "ssh",
"binary_version": "1:6.6p1-2ubuntu2.13+esm2"
},
{
"binary_name": "ssh-askpass-gnome",
"binary_version": "1:6.6p1-2ubuntu2.13+esm2"
},
{
"binary_name": "ssh-krb5",
"binary_version": "1:6.6p1-2ubuntu2.13+esm2"
}
]
}
{
"binaries": [
{
"binary_name": "openssh-client",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
},
{
"binary_name": "openssh-client-ssh1",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
},
{
"binary_name": "openssh-server",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
},
{
"binary_name": "openssh-sftp-server",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
},
{
"binary_name": "ssh",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
},
{
"binary_name": "ssh-askpass-gnome",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
},
{
"binary_name": "ssh-krb5",
"binary_version": "1:7.2p2-4ubuntu2.10+esm7"
}
]
}