The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734 - Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2016/Jan/44 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3446 - Third Party Advisory | |
References | () http://www.openssh.com/txt/release-7.1p2 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/01/14/7 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/537295/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/80695 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1034671 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2869-1 - Third Party Advisory | |
References | () https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ - Third Party Advisory | |
References | () https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ - Third Party Advisory | |
References | () https://bto.bluecoat.com/security-advisory/sa109 - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - Third Party Advisory | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201601-01 - Third Party Advisory | |
References | () https://support.apple.com/HT206167 - Third Party Advisory |
Information
Published : 2016-01-14 22:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0777
Mitre link : CVE-2016-0777
CVE.ORG link : CVE-2016-0777
JSON object : View
Products Affected
apple
- mac_os_x
oracle
- linux
- solaris
sophos
- unified_threat_management
- unified_threat_management_software
hp
- remote_device_access_virtual_customer_access_system
openbsd
- openssh
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor