aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorfeld <feld@FreeBSD.org>2016-11-02 21:26:33 +0800
committerfeld <feld@FreeBSD.org>2016-11-02 21:26:33 +0800
commitbeb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6 (patch)
tree7bb06628957f8f8853b4bc9d9fe4f6b4d0025fa8 /security
parente25da74d7f69d9ebf19693a7e2273a85792a98ae (diff)
downloadfreebsd-ports-gnome-beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6.tar.gz
freebsd-ports-gnome-beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6.tar.zst
freebsd-ports-gnome-beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6.zip
Update openssh vuxml entry to add FreeBSD SA information
Security: CVE-2016-8858 Security: SA-16:33.openssh
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml26
1 files changed, 17 insertions, 9 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 21647b0d38f3..ebb30c285eac 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -436,32 +436,40 @@ fuzzing and other initiatives.</li>
</vuln>
<vuln vid="6a2cfcdc-9dea-11e6-a298-14dae9d210b8">
- <topic>openssh -- denial of service</topic>
+ <topic>FreeBSD -- OpenSSH Remote Denial of Service vulnerability</topic>
<affects>
<package>
<name>openssh-portable</name>
<range><lt>7.3p1_1</lt></range>
</package>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>11.0</ge><lt>11.0_3</lt></range>
+ <range><ge>10.3</ge><lt>10.3_12</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p> reports:</p>
- <blockquote cite="http://seclists.org/oss-sec/2016/q4/191">
- <p>OpenSSH has a memory exhaustion bug in key exchange
- process. An unauthenticated peer could repeat the KEXINIT
- and cause allocation of up to 384MB(not 128MB that the official
- said). In the default case, an attacker can build 100 such
- connections, which will consume 38400 MB of memory on the server.</p>
- </blockquote>
+ <h1>Problem Description:</h1>
+ <p>When processing the SSH_MSG_KEXINIT message, the server
+ could allocate up to a few hundreds of megabytes of memory
+ per each connection, before any authentication take place.</p>
+ <h1>Impact:</h1>
+ <p>A remote attacker may be able to cause a SSH server to
+ allocate an excessive amount of memory. Note that the default
+ MaxStartups setting on FreeBSD will limit the effectiveness
+ of this attack.</p>
</body>
</description>
<references>
<url>http://seclists.org/oss-sec/2016/q4/191</url>
<cvename>CVE-2016-8858</cvename>
+ <freebsdsa>SA-16:33.openssh</freebsdsa>
</references>
<dates>
<discovery>2016-10-19</discovery>
<entry>2016-10-29</entry>
+ <modified>2016-11-02</modified>
</dates>
</vuln>