The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
Unitrends assessment: NOT EXPOSED
The dropbear ssh server is not the same as the openssh-server package. Our CentOS installations use the openssh-server package instead.
Fixed in dropbear-2013.59-1.el6 package from the Fedora EPEL repository.
LINK TO ADVISORIES