Several vulnerabilities have been reported for multiple products that use the SSH2 implementation for secure communications. The vulnerabilities have been reported to affect KEXINIT (key exchange initialization) phases of SSH communications. An attacker may exploit these vulnerabilities to perform denial of service attacks against vulnerable systems and possibly to execute malicious, attacker-supplied code. Further information about these vulnerabilities are currently unknown.
Several vulnerabilities have been reported for multiple products that use the SSH2 implementation for secure communications. The vulnerabilities have been reported to affect KEXINIT (key exchange initialization) phases of SSH communications. An attacker may exploit these vulnerabilities to perform denial of service attacks against vulnerable systems and possibly to execute malicious, attacker-supplied code. Further information about these vulnerabilities are currently unknown.