Ubuntu Security Notice (C) 2006-2015 Canonical, Inc. / NASL script (C) 2007-2015 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Tavis Ormandy discovered that the SSH daemon did not properly handle
authentication packets with duplicated blocks. By sending specially
crafted packets, a remote attacker could exploit this to cause the ssh
daemon to drain all available CPU resources until the login grace time
Mark Dowd discovered a race condition in the server's signal handling.
A remote attacker could exploit this to crash the server.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true