First published: Fri Oct 14 2016(Updated: )
** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =6.8 | |
OpenSSH | =6.9 | |
OpenSSH | =7.0 | |
OpenSSH | =7.1 | |
OpenSSH | =7.2 | |
OpenSSH | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8858 is classified as a denial of service vulnerability due to memory consumption issues caused by duplicate KEXINIT requests.
To address CVE-2016-8858, it is recommended to upgrade OpenSSH to a version later than 7.3.
CVE-2016-8858 affects OpenSSH versions 6.8 through 7.3.
There are currently no reports indicating active exploitation of CVE-2016-8858 in the wild.
CVE-2016-8858 allows remote attackers to cause a denial of service by sending a large number of duplicate KEXINIT requests.