Lucene search

K
osvGoogleOSV:DLA-594-1
HistoryAug 12, 2016 - 12:00 a.m.

openssh - security update

2016-08-1200:00:00
Google
osv.dev
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.045 Low

EPSS

Percentile

91.2%

OpenSSH secure shell client and server had a denial of service
vulnerability reported.

  • CVE-2016-6515
    The password authentication function in sshd in OpenSSH before 7.3
    does not limit password lengths for password authentication, which
    allows remote attackers to cause a denial of service
    (crypt CPU consumption) via a long string.

For Debian 7 Wheezy, this problems has been fixed in version
6.0p1-4+deb7u6.

We recommend that you upgrade your openssh packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS&gt;

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.045 Low

EPSS

Percentile

91.2%