A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished.
A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 14
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.5:p1:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.6:p1:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.7:p1:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.8:p1:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*
|
— | — |
|
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
|
— | — |
|
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:*
|
— | — |
|
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
— | — |
|
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
|
— | — |
|
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
|
— | — |