Ask the Community
Groups
CVE-2016-6515: openssh: Denial of service via very long passwords - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2016-6515</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>It was found that OpenSSH did not limit password lengths for password authentication. A remote unauthenticated attacker could use this flaw to temporarily trigger high CPU consumption in sshd by sending long passwords.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p></p> <ul><li>CentOS6 based Unitrends' appliances (physical and/or virtual), no fix is required.</li> <li>CentOS7 based Unitrends' appliances (physical and/or virtual), fix is in openssh-7.4p1-11.el7 and Unitrends' initial release of CentOS7 was with oepnssh-7.4p1-16.el7.</li> </ul><h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2016-6515">https://access.redhat.com/security/cve/cve-2016-6515</a></li></ul> </article> </main>