7.8
CVSSv2

CVE-2016-8858

Published: 09/12/2016 Updated: 11/04/2024
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 695
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x up to and including 7.3 allows remote malicious users to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh 6.9

openbsd openssh 7.3

openbsd openssh 7.1

openbsd openssh 7.2

openbsd openssh 6.8

openbsd openssh 7.0

Vendor Advisories

Debian Bug report logs - #841884 openssh: CVE-2016-8858: Memory exhaustion due to unregistered KEXINIT handler after receiving message Package: src:openssh; Maintainer for src:openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 24 Oct 20 ...