[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778

ID: oval:org.secpod.oval:def:1800137Date: (C)2018-03-28   (M)2024-01-29
Class: PATCHFamily: unix




OpenSSH clients between versions 5.4 and 7.1 are vulnerable to information disclosure that may allow a malicious server to retrieve information including under some circumstances, user"s private keys. This may be mitigated by adding the undocumented config option UseRoaming no to ssh_config. This bug is corrected in OpenSSH 7.1p2 and in OpenBSD"s stable branch. CVE-2016-0777. An information leak can be exploited by a rogue SSH server to trick a client into leaking sensitive data from the client memory, including for example private keys. CVE-2016-0778. A buffer overflow , can also be exploited by a rogue SSH server, but due to another bug in the code is possibly not exploitable, and only under certain conditions , when using ProxyCommand, ForwardAgent or ForwardX11.

Platform:
Alpine Linux 3.4
Product:
openssh
Reference:
5014
CVE-2016-0777
CVE-2016-0778
CVE    2
CVE-2016-0778
CVE-2016-0777
CPE    47
cpe:/a:openbsd:openssh:5.4:p1
cpe:/a:openbsd:openssh:5.0:p1
cpe:/a:openbsd:openssh:5.8:p1
cpe:/a:openbsd:openssh:5.1
...

© SecPod Technologies