OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability

Summary
OpenSSH is prone to a remote memory-corruption vulnerability.
Impact
An attacker can exploit this issue to execute arbitrary code in context of the application. Failed exploits may result in denial-of- service conditions.
Solution
Updates are available.
Insight
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
Affected
OpenSSH 6.4 and prior with J-PAKE implemented are vulnerable.
Detection
Check the version.
References