CVE-2016-8858
Gentoo Linux Security Advisory 201612-18
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
** DISPUTADA ** La función kex_input_kexinit en kex.c en OpenSSH 6.x y 7.x hasta la versión 7.3 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) enviando muchas peticiones duplicadas KEXINIT. NOTA: un tercero reporta que "OpenSSH upstream no considera esto como un problema de seguridad".
Multiple vulnerabilities have been found in OpenSSH, the worst of which allows remote attackers to cause Denial of Service. Versions less than 7.3_p1-r7 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-10-19 CVE Reserved
- 2016-12-07 CVE Published
- 2023-07-11 First Exploit
- 2024-08-06 CVE Updated
- 2025-07-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/10/19/3 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2016/10/20/1 | Mailing List |
|
http://www.securityfocus.com/bid/93776 | Third Party Advisory | |
http://www.securitytracker.com/id/1037057 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=1384860 | Issue Tracking | |
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf |
|
|
https://security.netapp.com/advisory/ntap-20180201-0001 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://github.com/dag-erling/kexkill | 2023-07-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.8 Search vendor "Openbsd" for product "Openssh" and version "6.8" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.9 Search vendor "Openbsd" for product "Openssh" and version "6.9" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 7.0 Search vendor "Openbsd" for product "Openssh" and version "7.0" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 7.1 Search vendor "Openbsd" for product "Openssh" and version "7.1" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 7.2 Search vendor "Openbsd" for product "Openssh" and version "7.2" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 7.3 Search vendor "Openbsd" for product "Openssh" and version "7.3" | - |
Affected
|