Impact
Malicious key exchange messages may lead to excessive CPU and memory usage due to overly tolerant handling of data received from unauthenticated users.
Malicious input may include:
- A large number of validly sized algorithms specified in the KEXINIT message.
- Cryptographic parameters with excessive size, causing cryptographic operations to generate unusually large exception data, which is then unnecessarily processed.
Workarounds
- set option parallel_login to false
- reduce max_sessions option
Affected/Unaffected Versions
A version larger than or equal to one of the listed patched versions is unaffected; otherwise, a version that satisfies an expression listed under affected versions is affected, and if it does not, it is unaffected.
The documentation of the new OTP version scheme describes how versions should be compared. Note that versions used prior to OTP 17.0, when the new OTP version scheme was introduced, are never listed since it is not well defined how to compare those versions.
In the case of this vulnerability, versions prior to OTP 17.0 are likely also affected.
Impact
Malicious key exchange messages may lead to excessive CPU and memory usage due to overly tolerant handling of data received from unauthenticated users.
Malicious input may include:
Workarounds
Affected/Unaffected Versions
A version larger than or equal to one of the listed patched versions is unaffected; otherwise, a version that satisfies an expression listed under affected versions is affected, and if it does not, it is unaffected.
The documentation of the new OTP version scheme describes how versions should be compared. Note that versions used prior to OTP 17.0, when the new OTP version scheme was introduced, are never listed since it is not well defined how to compare those versions.
In the case of this vulnerability, versions prior to OTP 17.0 are likely also affected.