Vulnerabilites related to hp - remote_device_access_virtual_customer_access_system
cve-2016-0777
Vulnerability from cvelistv5
Published
2016-01-14 00:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "name": "SUSE-SU-2016:0117", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "tags": [ "x_transferred" ], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "name": "APPLE-SA-2016-03-21-5", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/HT206167" }, { "name": "FEDORA-2016-4556904561", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "name": "80695", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/80695" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "name": "FreeBSD-SA-16:07", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc" }, { "name": "FEDORA-2016-c330264861", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openssh.com/txt/release-7.1p2" }, { "name": "openSUSE-SU-2016:0128", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "name": "FEDORA-2016-2e89eba0c1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "tags": [ "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "name": "1034671", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034671" }, { "name": "openSUSE-SU-2016:0127", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "name": "GLSA-201601-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "name": "SUSE-SU-2016:0119", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "name": "SUSE-SU-2016:0118", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "name": "FEDORA-2016-67c6ef0d4f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html" }, { "name": "SUSE-SU-2016:0120", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "name": "USN-2869-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "DSA-3446", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "name": "SUSE-SU-2016:0117", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "name": "APPLE-SA-2016-03-21-5", "tags": [ "vendor-advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "url": "https://support.apple.com/HT206167" }, { "name": "FEDORA-2016-4556904561", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "name": "80695", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/80695" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "name": "FreeBSD-SA-16:07", "tags": [ "vendor-advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc" }, { "name": "FEDORA-2016-c330264861", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "url": "http://www.openssh.com/txt/release-7.1p2" }, { "name": "openSUSE-SU-2016:0128", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "name": "FEDORA-2016-2e89eba0c1", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "name": "1034671", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1034671" }, { "name": "openSUSE-SU-2016:0127", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "name": "GLSA-201601-01", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "name": "SUSE-SU-2016:0119", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "name": "SUSE-SU-2016:0118", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "name": "FEDORA-2016-67c6ef0d4f", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html" }, { "name": "SUSE-SU-2016:0120", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "name": "USN-2869-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "DSA-3446", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0777", "datePublished": "2016-01-14T00:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2016-01-14 22:59
Modified
2024-11-21 02:42
Severity ?
Summary
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:unified_threat_management_software:9.318:*:*:*:*:*:*:*", "matchCriteriaId": "EFA93870-577B-4D53-A61D-22E024F96B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*", "matchCriteriaId": "9857D3A8-7942-4624-B3D6-9943D34030B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:unified_threat_management:110:*:*:*:*:*:*:*", "matchCriteriaId": "E9D7BF2E-1DEB-474A-8DEE-0A2D1A9B1A77", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:unified_threat_management:120:*:*:*:*:*:*:*", "matchCriteriaId": "CE59783E-6A2D-4777-9BA2-8527DA6B32BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:unified_threat_management:220:*:*:*:*:*:*:*", "matchCriteriaId": "646FEB9F-2F54-4946-9687-C2EC28144C97", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:unified_threat_management:320:*:*:*:*:*:*:*", "matchCriteriaId": "57654458-F143-4D70-9D52-0A242F3177A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:unified_threat_management:425:*:*:*:*:*:*:*", "matchCriteriaId": "A6527EC0-536E-4BF0-9949-8FA4A4E64688", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:unified_threat_management:525:*:*:*:*:*:*:*", "matchCriteriaId": "21A9EA52-E9F1-4267-86BC-570ED1ECC7B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:unified_threat_management:625:*:*:*:*:*:*:*", "matchCriteriaId": "280976E2-D7A8-43B7-A57C-66920BC91DAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "52D13E08-7B08-44AA-9017-3EE3F6301E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*", "matchCriteriaId": "727CC471-6473-4C8D-8D1A-D8B3C6AB21CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBC7FF1-01EE-40A1-8735-14360A371803", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.1:p1:*:*:*:*:*:*", "matchCriteriaId": "4CEDBF5F-23BD-4A60-926A-B822D5E3BFB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "987527F8-8A42-4729-A329-4D2AC8AFD6E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.2:p1:*:*:*:*:*:*", "matchCriteriaId": "CAF922B2-2FE6-4401-A4F1-914C637F5450", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "93910448-8D6F-4F7E-9C7F-959754ABA50D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.3:p1:*:*:*:*:*:*", "matchCriteriaId": "4ECE74F4-8E7B-42FA-A2DD-2EE0681DA4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "3356FDFD-BEA5-45A5-A36B-D1153AFE6C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*", "matchCriteriaId": "AA9D704A-D1E7-4989-9136-1EAD72EF6BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9394B8AD-AB22-4955-8774-C6BA2B56A260", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*", "matchCriteriaId": "78735121-6BA0-4158-B3D5-E4BACCA5E95A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "0C5D4A9B-1194-4D63-AAC2-8701C890BB0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*", "matchCriteriaId": "270BABBA-70A8-4FC7-962D-0D0D40F4497F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "F75DB5AE-E99D-4827-B290-823E015AEE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*", "matchCriteriaId": "A710EC9F-1352-4DF0-B1CF-9C51ACB078CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DA4F797B-8E2C-41AC-AA29-D6B50A539B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*", "matchCriteriaId": "7F482203-0CF1-403C-A25C-9B0DA24F6282", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*", "matchCriteriaId": "1E74684E-71D3-4458-A8BA-5248982273F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*", "matchCriteriaId": "9F3D478C-221F-4A07-8520-CD8856A75DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9754B4A-3042-49B8-86F7-2D60E25400C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*", "matchCriteriaId": "B018B05B-1311-4E0F-A9D0-620C1BF904A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3872787F-2C1C-40C0-B9CF-A3C0CEAAB400", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*", "matchCriteriaId": "728372F8-6561-473D-B54D-1DB41DA1CF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "39D1E296-3040-4CC9-B95B-3E07D73F1150", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*", "matchCriteriaId": "11BDA49F-C3E7-4D32-8105-E75525BFB2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*", "matchCriteriaId": "CE153B9F-721D-42ED-A662-C2597B7BF073", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCEE2677-16EE-484F-B2FB-FCA377E0D76B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*", "matchCriteriaId": "254243DD-2E3E-48ED-A92C-8F4FD405DA57", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "90798B9A-A1C6-4EC5-96BF-AF9C6FEFB63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*", "matchCriteriaId": "BCF734D8-1F01-498C-A917-5B528BFD9CAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A8ABE51-1535-44D9-B2A1-CC91021A29D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*", "matchCriteriaId": "492F661C-45E4-4B9B-AD26-1873D91DBEA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "546EB570-C2AC-473B-BED8-C47167D2593A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*", "matchCriteriaId": "CA2C8269-9C66-4E41-A56C-ACC709DC2053", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "64382F2C-15AC-41FE-A936-CEB44C1AFB9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*", "matchCriteriaId": "20B099B9-3D7E-47A4-94A5-B89759189D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*", "matchCriteriaId": "65A8629A-CFAE-4403-BEE7-622912483702", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*", "matchCriteriaId": "50836FA3-8116-4D58-B73E-B4830FB3A551", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*", "matchCriteriaId": "D0607649-62FE-41CB-9444-53CD9C5B67C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*", "matchCriteriaId": "3397D8DC-3410-401F-8854-BFCC35AD6686", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B0FB8D5-75CB-4691-AB9F-B4FA46973421", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*", "matchCriteriaId": "42DCED2D-76C5-49D1-A72D-E578CF686F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E1B240-BD86-41D3-BAC1-96005CB31DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*", "matchCriteriaId": "4BFC8587-FB9E-4FE2-B725-81CE3CE590F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:remote_device_access_virtual_customer_access_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "E172D760-1D72-4712-8A80-E9FB5B076E7F", "versionEndIncluding": "15.07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82", "versionEndIncluding": "10.11.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key." }, { "lang": "es", "value": "La funci\u00f3n resend_bytes en roaming_common.c en el cliente en OpenSSH 5.x, 6.x y 7.x en versiones anteriores a 7.1p2 permite a servidores remotos obtener informaci\u00f3n sensible desde la memoria de proceso mediante la petici\u00f3n de transmisi\u00f3n de un buffer completo, seg\u00fan lo demostrado mediante la lectura de una clave privada." } ], "id": "CVE-2016-0777", "lastModified": "2024-11-21T02:42:21.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-14T22:59:01.140", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.openssh.com/txt/release-7.1p2" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/80695" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034671" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "source": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT206167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openssh.com/txt/release-7.1p2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/80695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2869-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201601-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT206167" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }