OpenSSH 6.2 and 6.3 AES-GCM Cipher Memory Corruption

High Nessus Plugin ID 70895


The SSH server on the remote host is affected by a memory corruption vulnerability.


According to its banner, the version of OpenSSH running on the remote host is version 6.2 or 6.3. It is, therefore, affected by a memory corruption vulnerability in post-authentication when the AES-GCM cipher is used for the key exchange. Exploitation of this vulnerability could lead to arbitrary code execution.

Note that installations are only vulnerable if built against an OpenSSL library that supports AES-GCM.


Upgrade to OpenSSH 6.4 or refer to the vendor for a patch or workaround.

See Also

Plugin Details

Severity: High

ID: 70895

File Name: openssh_gcm.nasl

Version: $Revision: 1.2 $

Type: remote

Family: Misc.

Published: 2013/11/13

Modified: 2017/01/10

Dependencies: 10267, 70657

Risk Information

Risk Factor: High


Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/11/07

Vulnerability Publication Date: 2013/11/07

Reference Information

CVE: CVE-2013-4548

BID: 63605

OSVDB: 99551