The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734 - Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2016/Jan/44 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3446 - Third Party Advisory | |
References | () http://www.openssh.com/txt/release-7.1p2 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/01/14/7 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/537295/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/80695 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1034671 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2869-1 - Third Party Advisory | |
References | () https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ - Third Party Advisory | |
References | () https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ - Third Party Advisory | |
References | () https://bto.bluecoat.com/security-advisory/sa109 - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - Third Party Advisory | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201601-01 - Third Party Advisory | |
References | () https://support.apple.com/HT206167 - Third Party Advisory |
13 Dec 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2016-01-14 22:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0777
Mitre link : CVE-2016-0777
CVE.ORG link : CVE-2016-0777
JSON object : View
Products Affected
oracle
- solaris
- linux
openbsd
- openssh
apple
- mac_os_x
sophos
- unified_threat_management_software
- unified_threat_management
hp
- remote_device_access_virtual_customer_access_system
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor