The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734 - Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html - Mailing List, Release Notes, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2016/Jan/44 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3446 - Third Party Advisory | |
References | () http://www.openssh.com/txt/release-7.1p2 - Patch, Release Notes, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/01/14/7 - Exploit, Mailing List, Technical Description, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/537295/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/80698 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1034671 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2869-1 - Third Party Advisory | |
References | () https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ - Release Notes, Vendor Advisory | |
References | () https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ - Release Notes, Vendor Advisory | |
References | () https://bto.bluecoat.com/security-advisory/sa109 - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201601-01 - Third Party Advisory | |
References | () https://support.apple.com/HT206167 - Vendor Advisory |
13 Dec 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2016-01-14 22:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0778
Mitre link : CVE-2016-0778
CVE.ORG link : CVE-2016-0778
JSON object : View
Products Affected
hp
- virtual_customer_access_system
oracle
- solaris
- linux
openbsd
- openssh
apple
- mac_os_x
sophos
- unified_threat_management_software
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer