Top Layer Networks Information for VU#333628

OpenSSH contains buffer management errors


Not Affected

Vendor Statement

This notification is to inform you that Top Layer products are not susceptible to the recently announce OpenSSH vulnerability (versions prior to 3.7.1) which appear to occur as a result of buffer management errors. Specifically, this is an issue with freeing the appropriate memory size on the heap, where in certain cases, the memory cleared is too large and might cause heap corruption.

More detailed information about this vulnerability can be found at:

OpenSSH link:

Top Layer Networks advises following best security practices by restricting the management of any Top Layer device to required address range and ports, as well as denying access to all protocols that are not required.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.