[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2016-638 ---- openssh, pam_ssh_agent_auth

ID: oval:org.secpod.oval:def:1600390Date: (C)2016-05-19   (M)2024-01-29
Class: PATCHFamily: unix




An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory of a successfully authenticated OpenSSH client.A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options.

Platform:
Amazon Linux AMI
Product:
openssh
pam_ssh_agent_auth
Reference:
ALAS-2016-638
CVE-2016-0777
CVE-2016-0778
CVE    2
CVE-2016-0778
CVE-2016-0777
CPE    47
cpe:/o:amazon:linux
cpe:/a:openbsd:openssh:5.4:p1
cpe:/a:openbsd:openssh:5.0:p1
cpe:/a:openbsd:openssh:5.8:p1
...

© SecPod Technologies