oss-sec mailing list archives

Re: Re: CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSH


From: Huzaifa Sidhpurwala <huzaifas () redhat com>
Date: Thu, 20 Oct 2016 08:39:40 +0530

On 10/20/2016 03:02 AM, cve-assign () mitre org wrote:
The OpenSSH has a memory exhaustion bug in key exchange process. An
unauthenticated peer could repeat the KEXINIT and cause allocation of
up to 384MB(not 128MB that the official said). In the default case, an
attacker can build 100 such connections, which will consume 38400 MB
of memory on the server.

http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup

Unregister the KEXINIT handler after message has been received.

Use CVE-2016-8858.


OpenSSH upstream dos not consider this as a security issue btw.

It seems the only thing the attacker could do here, is self-dos his own
connection. Regarding consuming memory on the server, by opening several
concurrent connections at the same time, there are various protections
available in opensshd_config file, such as "MaxStartups", which can
limit the maximum number of sessions per network connections.

This value is effectively set to 10:30:100 so maximum of 100 * 128 MB
can be allocated, which is pretty much for unauthenticated user. Though
the rate limiting starts to drop connection after 10, which is like 1GB
and which should not hurt the server (though it is not cool).





-- 
Huzaifa Sidhpurwala / Red Hat Product Security Team


Current thread: