diff options
author | feld <feld@FreeBSD.org> | 2016-11-02 21:26:33 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-11-02 21:26:33 +0800 |
commit | beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6 (patch) | |
tree | 7bb06628957f8f8853b4bc9d9fe4f6b4d0025fa8 /security | |
parent | e25da74d7f69d9ebf19693a7e2273a85792a98ae (diff) | |
download | freebsd-ports-gnome-beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6.tar.gz freebsd-ports-gnome-beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6.tar.zst freebsd-ports-gnome-beb9b0c4f82fc7702ce5ad2cfa4a0f0d2f2990c6.zip |
Update openssh vuxml entry to add FreeBSD SA information
Security: CVE-2016-8858
Security: SA-16:33.openssh
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 26 |
1 files changed, 17 insertions, 9 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 21647b0d38f3..ebb30c285eac 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -436,32 +436,40 @@ fuzzing and other initiatives.</li> </vuln> <vuln vid="6a2cfcdc-9dea-11e6-a298-14dae9d210b8"> - <topic>openssh -- denial of service</topic> + <topic>FreeBSD -- OpenSSH Remote Denial of Service vulnerability</topic> <affects> <package> <name>openssh-portable</name> <range><lt>7.3p1_1</lt></range> </package> + <package> + <name>FreeBSD</name> + <range><ge>11.0</ge><lt>11.0_3</lt></range> + <range><ge>10.3</ge><lt>10.3_12</lt></range> + </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p> reports:</p> - <blockquote cite="http://seclists.org/oss-sec/2016/q4/191"> - <p>OpenSSH has a memory exhaustion bug in key exchange - process. An unauthenticated peer could repeat the KEXINIT - and cause allocation of up to 384MB(not 128MB that the official - said). In the default case, an attacker can build 100 such - connections, which will consume 38400 MB of memory on the server.</p> - </blockquote> + <h1>Problem Description:</h1> + <p>When processing the SSH_MSG_KEXINIT message, the server + could allocate up to a few hundreds of megabytes of memory + per each connection, before any authentication take place.</p> + <h1>Impact:</h1> + <p>A remote attacker may be able to cause a SSH server to + allocate an excessive amount of memory. Note that the default + MaxStartups setting on FreeBSD will limit the effectiveness + of this attack.</p> </body> </description> <references> <url>http://seclists.org/oss-sec/2016/q4/191</url> <cvename>CVE-2016-8858</cvename> + <freebsdsa>SA-16:33.openssh</freebsdsa> </references> <dates> <discovery>2016-10-19</discovery> <entry>2016-10-29</entry> + <modified>2016-11-02</modified> </dates> </vuln> |