sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation158 reference(s) from NVD