diff options
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index afaeb14b63d8..4fe151686f52 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6ed5c5e3-a840-11e7-b5af-a4badb2f4699"> + <topic>FreeBSD -- OpenSSH Denial of Service vulnerability</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>11.1</ge><lt>11.1_1</lt></range> + <range><ge>11.0</ge><lt>11.0_12</lt></range> + <range><ge>10.3</ge><lt>10.3_21</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>There is no limit on the password length.</p> + <h1>Impact:</h1> + <p>A remote attacker may be able to cause an affected SSH + server to use excessive amount of CPU by sending very long + passwords, when PasswordAuthentication is enabled by the + system administrator.</p> + </body> + </description> + <references> + <cvename>CVE-2016-6515</cvename> + <freebsdsa>SA-17:06.openssh</freebsdsa> + </references> + <dates> + <discovery>2017-08-10</discovery> + <entry>2017-10-03</entry> + </dates> + </vuln> + <vuln vid="420243e9-a840-11e7-b5af-a4badb2f4699"> <topic>FreeBSD -- heimdal KDC-REP service name validation vulnerability</topic> <affects> |