CVE-2016-0777
Vulnerability from cvelistv5
Published
2016-01-14 00:00
Modified
2024-08-05 22:30
Severity ?
Summary
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
References
secalert@redhat.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.htmlThird Party Advisory, VDB Entry
secalert@redhat.comhttp://seclists.org/fulldisclosure/2016/Jan/44Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3446Third Party Advisory
secalert@redhat.comhttp://www.openssh.com/txt/release-7.1p2Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/01/14/7Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/537295/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/80695VDB Entry, Third Party Advisory
secalert@redhat.comhttp://www.securitytracker.com/id/1034671Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2869-1Third Party Advisory
secalert@redhat.comhttps://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/Third Party Advisory
secalert@redhat.comhttps://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/Third Party Advisory
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa109Third Party Advisory
secalert@redhat.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722Third Party Advisory
secalert@redhat.comhttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.ascThird Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201601-01Third Party Advisory
secalert@redhat.comhttps://support.apple.com/HT206167Third Party Advisory
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:30:04.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
          },
          {
            "name": "SUSE-SU-2016:0117",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
          },
          {
            "name": "APPLE-SA-2016-03-21-5",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
          },
          {
            "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/HT206167"
          },
          {
            "name": "FEDORA-2016-4556904561",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
          },
          {
            "name": "80695",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/80695"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "FreeBSD-SA-16:07",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
          },
          {
            "name": "FEDORA-2016-c330264861",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openssh.com/txt/release-7.1p2"
          },
          {
            "name": "openSUSE-SU-2016:0128",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
          },
          {
            "name": "FEDORA-2016-2e89eba0c1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa109"
          },
          {
            "name": "1034671",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034671"
          },
          {
            "name": "openSUSE-SU-2016:0127",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
          },
          {
            "name": "GLSA-201601-01",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201601-01"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
          },
          {
            "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
          },
          {
            "name": "SUSE-SU-2016:0119",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
          },
          {
            "name": "SUSE-SU-2016:0118",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
          },
          {
            "name": "FEDORA-2016-67c6ef0d4f",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
          },
          {
            "name": "SUSE-SU-2016:0120",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
          },
          {
            "name": "USN-2869-1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2869-1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
          },
          {
            "name": "DSA-3446",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3446"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-13T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
        },
        {
          "name": "SUSE-SU-2016:0117",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
        },
        {
          "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
        },
        {
          "name": "APPLE-SA-2016-03-21-5",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
        },
        {
          "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
        },
        {
          "url": "https://support.apple.com/HT206167"
        },
        {
          "name": "FEDORA-2016-4556904561",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
        },
        {
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
        },
        {
          "name": "80695",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securityfocus.com/bid/80695"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "FreeBSD-SA-16:07",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
        },
        {
          "name": "FEDORA-2016-c330264861",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
        },
        {
          "url": "http://www.openssh.com/txt/release-7.1p2"
        },
        {
          "name": "openSUSE-SU-2016:0128",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
        },
        {
          "name": "FEDORA-2016-2e89eba0c1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
        },
        {
          "url": "https://bto.bluecoat.com/security-advisory/sa109"
        },
        {
          "name": "1034671",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1034671"
        },
        {
          "name": "openSUSE-SU-2016:0127",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
        },
        {
          "name": "GLSA-201601-01",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/201601-01"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
        },
        {
          "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
        },
        {
          "name": "SUSE-SU-2016:0119",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
        },
        {
          "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
        },
        {
          "name": "SUSE-SU-2016:0118",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
        },
        {
          "name": "FEDORA-2016-67c6ef0d4f",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
        },
        {
          "name": "SUSE-SU-2016:0120",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
        },
        {
          "name": "USN-2869-1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2869-1"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
        },
        {
          "name": "DSA-3446",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3446"
        },
        {
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-0777",
    "datePublished": "2016-01-14T00:00:00",
    "dateReserved": "2015-12-16T00:00:00",
    "dateUpdated": "2024-08-05T22:30:04.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-0777\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-01-14T22:59:01.140\",\"lastModified\":\"2022-12-13T12:15:18.887\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n resend_bytes en roaming_common.c en el cliente en OpenSSH 5.x, 6.x y 7.x en versiones anteriores a 7.1p2 permite a servidores remotos obtener informaci\u00f3n sensible desde la memoria de proceso mediante la petici\u00f3n de transmisi\u00f3n de un buffer completo, seg\u00fan lo demostrado mediante la lectura de una clave privada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:unified_threat_management_software:9.318:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA93870-577B-4D53-A61D-22E024F96B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9857D3A8-7942-4624-B3D6-9943D34030B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D7BF2E-1DEB-474A-8DEE-0A2D1A9B1A77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE59783E-6A2D-4777-9BA2-8527DA6B32BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"646FEB9F-2F54-4946-9687-C2EC28144C97\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57654458-F143-4D70-9D52-0A242F3177A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:425:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6527EC0-536E-4BF0-9949-8FA4A4E64688\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:525:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A9EA52-E9F1-4267-86BC-570ED1ECC7B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sophos:unified_threat_management:625:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280976E2-D7A8-43B7-A57C-66920BC91DAB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104DA87B-DEE4-4262-AE50-8E6BC43B228B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D13E08-7B08-44AA-9017-3EE3F6301E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"727CC471-6473-4C8D-8D1A-D8B3C6AB21CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBC7FF1-01EE-40A1-8735-14360A371803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEDBF5F-23BD-4A60-926A-B822D5E3BFB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"987527F8-8A42-4729-A329-4D2AC8AFD6E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF922B2-2FE6-4401-A4F1-914C637F5450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93910448-8D6F-4F7E-9C7F-959754ABA50D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECE74F4-8E7B-42FA-A2DD-2EE0681DA4B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3356FDFD-BEA5-45A5-A36B-D1153AFE6C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9D704A-D1E7-4989-9136-1EAD72EF6BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9394B8AD-AB22-4955-8774-C6BA2B56A260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"78735121-6BA0-4158-B3D5-E4BACCA5E95A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5D4A9B-1194-4D63-AAC2-8701C890BB0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"270BABBA-70A8-4FC7-962D-0D0D40F4497F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75DB5AE-E99D-4827-B290-823E015AEE34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A710EC9F-1352-4DF0-B1CF-9C51ACB078CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4F797B-8E2C-41AC-AA29-D6B50A539B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F482203-0CF1-403C-A25C-9B0DA24F6282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E74684E-71D3-4458-A8BA-5248982273F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3D478C-221F-4A07-8520-CD8856A75DCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9754B4A-3042-49B8-86F7-2D60E25400C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B018B05B-1311-4E0F-A9D0-620C1BF904A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3872787F-2C1C-40C0-B9CF-A3C0CEAAB400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"728372F8-6561-473D-B54D-1DB41DA1CF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D1E296-3040-4CC9-B95B-3E07D73F1150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"11BDA49F-C3E7-4D32-8105-E75525BFB2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE153B9F-721D-42ED-A662-C2597B7BF073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCEE2677-16EE-484F-B2FB-FCA377E0D76B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"254243DD-2E3E-48ED-A92C-8F4FD405DA57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90798B9A-A1C6-4EC5-96BF-AF9C6FEFB63D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF734D8-1F01-498C-A917-5B528BFD9CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8ABE51-1535-44D9-B2A1-CC91021A29D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"492F661C-45E4-4B9B-AD26-1873D91DBEA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546EB570-C2AC-473B-BED8-C47167D2593A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2C8269-9C66-4E41-A56C-ACC709DC2053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64382F2C-15AC-41FE-A936-CEB44C1AFB9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B099B9-3D7E-47A4-94A5-B89759189D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A8629A-CFAE-4403-BEE7-622912483702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50836FA3-8116-4D58-B73E-B4830FB3A551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0607649-62FE-41CB-9444-53CD9C5B67C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3397D8DC-3410-401F-8854-BFCC35AD6686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0FB8D5-75CB-4691-AB9F-B4FA46973421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DCED2D-76C5-49D1-A72D-E578CF686F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E1B240-BD86-41D3-BAC1-96005CB31DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BFC8587-FB9E-4FE2-B725-81CE3CE590F8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:remote_device_access_virtual_customer_access_system:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.07\",\"matchCriteriaId\":\"E172D760-1D72-4712-8A80-E9FB5B076E7F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.11.3\",\"matchCriteriaId\":\"D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2016/Jan/44\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3446\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openssh.com/txt/release-7.1p2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/14/7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/537295/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/80695\",\"source\":\"secalert@redhat.com\",\"tags\":[\"VDB Entry\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034671\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2869-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa109\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201601-01\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206167\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.