{"id":"CVE-2016-8858","details":"The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.  NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"","modified":"2026-04-11T05:01:02.738277Z","published":"2016-12-09T11:59:00.207Z","related":["SUSE-SU-2017:0264-1","SUSE-SU-2017:0603-1","SUSE-SU-2017:0606-1","SUSE-SU-2017:0607-1","SUSE-SU-2017:0607-2","SUSE-SU-2017:0607-3","SUSE-SU-2017:1661-1","openSUSE-SU-2024:11124-1"],"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/19/3"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/20/1"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93776"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037057"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:33.openssh.asc"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-18"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180201-0001/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384860"},{"type":"REPORT","url":"http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h"},{"type":"REPORT","url":"http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup"},{"type":"FIX","url":"https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad"},{"type":"FIX","url":"https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssh/openssh-portable","events":[{"introduced":"0"},{"last_affected":"9f82e5a9042f2d872e98f48a876fcab3e25dd9bb"},{"introduced":"0"},{"last_affected":"7de4b03a6e4071d454b72927ffaf52949fa34545"},{"introduced":"0"},{"last_affected":"1dc8d93ce69d6565747eb44446ed117187621b26"},{"introduced":"0"},{"last_affected":"99522ba7ec6963a05c04a156bf20e3ba3605987c"},{"fixed":"ec165c392ca54317dbe3064a8c200de6531e89ad"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.8"},{"introduced":"0"},{"last_affected":"6.9"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"7.3"}]}}],"versions":["ABOUT_TO_ADD_INET_ATON","AFTER_FREEBSD_PAM_MERGE","AFTER_KRB5_GSSAPI_MERGE","BEFORE_FREEBSD_PAM_MERGE","BEFORE_KRB5_GSSAPI_MERGE","POST_KRB4_REMOVAL","PRE-REORDER","PRE_CYGWIN_MERGE","PRE_DAN_PATCH_MERGE","PRE_FIXPATHS_INTEGRATION","PRE_HPUX_INTEGRATION","PRE_IPV6","PRE_KRB4_REMOVAL","PRE_NEW_LOGIN_CODE","PRE_SW_KRBV","V_1_2PRE17","V_1_2_1_PRE18","V_1_2_1_PRE19","V_1_2_1_PRE20","V_1_2_1_PRE21","V_1_2_1_PRE22","V_1_2_1_PRE23","V_1_2_1_PRE24","V_1_2_1_PRE25","V_1_2_1_PRE26","V_1_2_1_PRE27","V_1_2_2","V_1_2_2_P1","V_1_2_2_PRE28","V_1_2_2_PRE29","V_1_2_3","V_1_2_3_PRE1","V_1_2_3_PRE2","V_1_2_3_PRE3","V_1_2_3_PRE4","V_1_2_3_PRE5","V_1_2_3_TEST1","V_1_2_3_TEST2","V_1_2_3_TEST3","V_1_2_PRE10","V_1_2_PRE11","V_1_2_PRE12","V_1_2_PRE13","V_1_2_PRE14","V_1_2_PRE15","V_1_2_PRE16","V_1_2_PRE4","V_1_2_PRE5","V_1_2_PRE6","V_1_2_PRE7","V_1_2_PRE8","V_1_2_PRE9","V_2_0_0_BETA1","V_2_0_0_BETA2","V_2_0_0_TEST1","V_2_1_0","V_2_1_0_P1","V_2_1_0_P2","V_2_1_0_P3","V_2_1_1_P1","V_2_1_1_P2","V_2_1_1_P3","V_2_1_1_P4","V_2_2_0_P1","V_2_3_0_P1","V_2_5_0_P1","V_2_5_1_P1","V_2_5_1_P2","V_2_5_2_P1","V_3_0_1_P1","V_3_0_P1","V_3_1_P1","V_3_2_2_P1","V_3_4_P1","V_3_6_1_P1","V_3_8_P1","V_3_9_P1","V_4_2_P1","V_5_0_P1","V_5_1_P1","V_5_2_P1","V_5_5_P1","V_5_7_P1","V_6_0_P1","V_6_1_P1","V_6_2_P1","V_6_5_P1","V_6_6_P1","V_6_8_P1","V_6_9_P1","V_7_0_P1","V_7_1_P1","V_7_2_P1","V_7_3_P1"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"file":"kex.c"},"source":"https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad","digest":{"threshold":0.9,"line_hashes":["156902939790282373310700724171657588209","316380331125517353126913904911828465574","295105781540324081782822153413707735107","244003011357174172644176527148363962509"]},"id":"CVE-2016-8858-2d5da5dc","signature_version":"v1","signature_type":"Line"},{"deprecated":false,"target":{"function":"kex_input_kexinit","file":"kex.c"},"source":"https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad","digest":{"length":1030,"function_hash":"235425802652287821391024408040613178504"},"id":"CVE-2016-8858-dfa55b22","signature_version":"v1","signature_type":"Function"}],"vanir_signatures_modified":"2026-04-11T05:01:02Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8858.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}