Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.
Start learningUpgrade openssh-portable
to version 9.9p2 or higher.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the ssh_packet_read_poll_seqnr()
function in packet.c
. Ping packets (SSH2_MSG_PING
) received without authentication buffer but neither send nor free PONG
responses, which can consume unlimited resources (memory and CPU).