The sshd daemon allows a number of file transfer methods through a secure ssh connection, including scp and sftp. A remote attacker able to authenticate through ssh may be able to establish multiple file transfers and cause high CPU utilization on the server. This does not appear to impede normal process scheduling.
The sshd daemon allows a number of file transfer methods through a secure ssh connection, including scp and sftp. A remote attacker able to authenticate through ssh may be able to establish multiple file transfers and cause high CPU utilization on the server. This does not appear to impede normal process scheduling.