The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
{ "vanir_signatures": [ { "id": "CVE-2016-6515-a7ac801a", "deprecated": false, "signature_version": "v1", "source": "https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97", "digest": { "function_hash": "226840948738846026054403909505423905859", "length": 1046.0 }, "signature_type": "Function", "target": { "function": "auth_password", "file": "auth-passwd.c" } }, { "id": "CVE-2016-6515-f74bc6a0", "deprecated": false, "signature_version": "v1", "source": "https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97", "digest": { "line_hashes": [ "169366794320422204000709960000445355030", "311121508538256338473633648009588614623", "210215936786631902887231947746032519312", "145147796172036403093771438374944323202", "34022028665672401654215887975195649129", "13648517431284205482544467659725921705", "194613709597506156553679113958316693368" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "auth-passwd.c" } } ] }