Date: Wed, 2 Nov 2016 13:26:34 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r425152 - head/security/vuxml Message-ID: <201611021326.uA2DQYpD019437@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Wed Nov 2 13:26:33 2016 New Revision: 425152 URL: https://svnweb.freebsd.org/changeset/ports/425152 Log: Update openssh vuxml entry to add FreeBSD SA information Security: CVE-2016-8858 Security: SA-16:33.openssh Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Nov 2 13:19:27 2016 (r425151) +++ head/security/vuxml/vuln.xml Wed Nov 2 13:26:33 2016 (r425152) @@ -436,32 +436,40 @@ fuzzing and other initiatives.</li> </vuln> <vuln vid="6a2cfcdc-9dea-11e6-a298-14dae9d210b8"> - <topic>openssh -- denial of service</topic> + <topic>FreeBSD -- OpenSSH Remote Denial of Service vulnerability</topic> <affects> <package> <name>openssh-portable</name> <range><lt>7.3p1_1</lt></range> </package> + <package> + <name>FreeBSD</name> + <range><ge>11.0</ge><lt>11.0_3</lt></range> + <range><ge>10.3</ge><lt>10.3_12</lt></range> + </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p> reports:</p> - <blockquote cite="http://seclists.org/oss-sec/2016/q4/191"> - <p>OpenSSH has a memory exhaustion bug in key exchange - process. An unauthenticated peer could repeat the KEXINIT - and cause allocation of up to 384MB(not 128MB that the official - said). In the default case, an attacker can build 100 such - connections, which will consume 38400 MB of memory on the server.</p> - </blockquote> + <h1>Problem Description:</h1> + <p>When processing the SSH_MSG_KEXINIT message, the server + could allocate up to a few hundreds of megabytes of memory + per each connection, before any authentication take place.</p> + <h1>Impact:</h1> + <p>A remote attacker may be able to cause a SSH server to + allocate an excessive amount of memory. Note that the default + MaxStartups setting on FreeBSD will limit the effectiveness + of this attack.</p> </body> </description> <references> <url>http://seclists.org/oss-sec/2016/q4/191</url> <cvename>CVE-2016-8858</cvename> + <freebsdsa>SA-16:33.openssh</freebsdsa> </references> <dates> <discovery>2016-10-19</discovery> <entry>2016-10-29</entry> + <modified>2016-11-02</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201611021326.uA2DQYpD019437>
