Vulnerability Details : CVE-2016-8858
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
Vulnerability category: Denial of service
Threat overview for CVE-2016-8858
Top countries where our scanners detected CVE-2016-8858
Top open port discovered on systems with this issue
22
IPs affected by CVE-2016-8858 1,591,466
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-8858!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-8858
Probability of exploitation activity in the next 30 days: 78.35%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-8858
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-8858
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8858
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:33.openssh.asc
Third Party Advisory
-
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig
Patch;Vendor Advisory
-
http://www.securitytracker.com/id/1037057
OpenSSH Key Exchange Initialization Bug in kex_input_kexinit() Lets Remote Users Consume Excessive Memory Resources - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2016/10/20/1
oss-security - Re: Re: CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSHMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1384860
1384860 – (CVE-2016-8858) CVE-2016-8858 openssh: Memory exhaustion due to unregistered KEXINIT handler after receiving messageIssue Tracking
-
http://www.openwall.com/lists/oss-security/2016/10/19/3
oss-security - CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSHMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/93776
OpenSSH 'ssh/kex.c' Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad
upstream commit · openssh/openssh-portable@ec165c3 · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
src/usr.bin/ssh/kex.c - view - 1.127Issue Tracking;Vendor Advisory
-
https://security.netapp.com/advisory/ntap-20180201-0001/
CVE-2016-8858 OpenSSH Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
-
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h
src/usr.bin/ssh/kex.c - diff - 1.127Issue Tracking;Vendor Advisory
-
https://security.gentoo.org/glsa/201612-18
OpenSSH: Multiple vulnerabilities (GLSA 201612-18) — Gentoo securityThird Party Advisory
Products affected by CVE-2016-8858
- cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:7.3:*:*:*:*:*:*:*