Brocade Security Advisory |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Summary
The auth_password function
in auth-passwd.c in sshd
in OpenSSH before 7.3 does not limit password
lengths for password authentication, which allows remote attackers to cause a
denial of service (crypt CPU consumption) via a long string. Affected Products
Products Confirmed Not Vulnerable
Brocade
FastIron OS, Brocade NetIron
OS, Brocade Network Advisor, Brocade SDN Controller, Brocade ServerIron ADX, Brocade Services Director, Brocade
Virtual ADX, Brocade Virtual Traffic Manager:
Software, and Brocade Virtual Web Application Firewall are confirmed not
affected by this vulnerability. Workaround
There are no workarounds that address this
vulnerability. Revision History
Disclaimer
THIS
DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND
DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE
INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED
HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE
VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE
RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. |