Vigil@nce - OpenSSH: denial of service via kex_input_kexinit
December 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An unauthenticated attacker can send some SSH messages to OpenSSH,
in order to trigger a denial of service.
Impacted products: FreeBSD, OpenBSD, OpenSSH.
Severity: 2/4.
Creation date: 11/10/2016.
DESCRIPTION OF THE VULNERABILITY
The OpenSSH product uses the kex_input_kexinit() function during
the initialization of the key exchange.
However, the ssh_dispatch_set() function is not called, which
leads to the consumption of memory and CPU.
An unauthenticated attacker can therefore send some SSH messages
to OpenSSH, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/OpenSSH-denial-of-service-via-kex-input-kexinit-20819