CVE-2016-0777

Scores

EPSS

0.672medium67.2%
0%20%40%60%80%100%

Percentile: 67.2%

CVSS

6.5medium3.x
0246810

CVSS Score: 6.5/10

All CVSS Scores

CVSS 3.x
6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Description

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-200CWE-682

Related Vulnerabilities

Recommendations

Source: nvd

All OpenSSH users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=net-misc/openssh-7.1_p2”

URL: https://security.gentoo.org/glsa/201601-01

Vulnerable Software (11)

Type: Configuration

Product: openssh

Operating System: rhel 7

Trait:
{  "fixed": "6.6.1p1-23.el7_2"}

Source: redhat

Type: Configuration

Product: openssh

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "1:6.6p1-2ubuntu2.4"}

Source: ubuntu

Type: Configuration

Product: openssh

Operating System: ubuntu vivid 15.04

Trait:
{  "fixed": "1:6.7p1-5ubuntu1.4"}

Source: ubuntu

Type: Configuration

Product: openssh

Operating System: ubuntu wily 15.10

Trait:
{  "fixed": "1:6.9p1-2ubuntu0.1"}

Source: ubuntu

Type: Configuration

Product: openssh

Operating System: debian

Trait:
{  "fixed": "1:7.1p2-1"}

Source: debian

Type: Configuration

Vendor: *

Product: linux_distro

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",      "vulne...

Source: nvd

Type: Configuration

Vendor: *

Product: mac_os_x

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",      "versionEndIncluding": "10.11.3",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: openssh

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*",      ...

Source: nvd

Type: Configuration

Vendor: *

Product: remote_device_access_virtual_customer_access_system

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:hp:remote_device_access_virtual_customer_access_system:*:*:*:*:*:*:*:*",      "versionEndIncluding": "15.07",      "vulnerable": true    }  ],...

Source: nvd

Type: Configuration

Vendor: *

Product: solaris

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",      "vulne...

Source: nvd

Type: Configuration

Vendor: *

Product: unified_threat_management_software

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:sophos:unified_threat_management_software:9.318:*:*:*:*:*:*:*",          "vulnerable": true        },        ...

Source: nvd

End of list