Description
It was discovered that OpenSSH incorrectly handled the transport-level ping facility.
A remote attacker could possibly use this issue to cause OpenSSH
clients and servers to consume resources, leading to a denial of service.
| CVSS |
3.1 |
| Base Score |
5.9 |
| Severity |
Medium |
| Vector |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Attack Vector |
Network |
| Attack Complexity |
High |
| Privileges Required |
None |
| User Interaction |
None |
| Scope |
Unchanged |
| Confidentiality Impact |
None |
| Integrity Impact |
None |
| Availability Impact |
High |
| CVSS |
4.0 |
| Base Score |
8.2 |
| Vector |
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| Attack Vector |
Network |
| Attack Complexity |
High |
| Attack Requirements |
None |
| Privileges Required |
None |
| User Interaction |
None |
| Vulnerable System Confidentiality Impact |
None |
| Vulnerable System Integrity Impact |
None |
| Vulnerable System Availability Impact |
High |
| Subsequent System Confidentiality Impact |
None |
| Subsequent System Integrity Impact |
None |
| Subsequent System Availability Impact |
None |
Affected OpenSSH versions: 9.5p1 to 9.9p1
References