vendor:
OpenSSH
by:
Tavis Ormandy <taviso@google.com>
7.8
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: OpenSSH
Affected Version From: Not provided
Affected Version To: Not provided
Patch Exists: YES
Related CWE: CVE-2016-10012
CPE: Not provided
Metasploit:
https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/aix-5.3-openssh_advisory10_cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/openbsd-openssh-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/aix-7.1-openssh_advisory10_cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/aix-6.1-openssh_advisory10_cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/aix-7.2-openssh_advisory10_cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/apple-osx-openssh-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-10012/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-10012/
Platforms Tested: Linux
Not provided
OpenSSH CRC compensation attack detection DoS PoC
This is a Proof of Concept (PoC) for the OpenSSH CRC compensation attack detection Denial of Service (DoS) vulnerability. The vulnerability allows an attacker to cause a DoS condition on a target system by exploiting a weakness in the CRC compensation feature of OpenSSH. By sending specially crafted packets to the target system, the attacker can trigger a CRC calculation loop that consumes excessive CPU resources and leads to a DoS condition. This PoC script implements the CRC-32 algorithm in bash and can be used to test the vulnerability on a target system.
Mitigation:
Apply the patch provided by the OpenSSH project to fix the vulnerability. The patch introduces additional checks to prevent the CRC calculation loop from being triggered. It is recommended to update to the latest version of OpenSSH to ensure the vulnerability is patched.