First published: Thu Jan 14 2016(Updated: )
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Unified Threat Management | =9.318 | |
Sophos Unified Threat Management | =9.353 | |
Sophos Unified Threat Management | =110 | |
Sophos Unified Threat Management | =120 | |
Sophos Unified Threat Management | =220 | |
Sophos Unified Threat Management | =320 | |
Sophos Unified Threat Management | =425 | |
Sophos Unified Threat Management | =525 | |
Sophos Unified Threat Management | =625 | |
Oracle Linux | =7 | |
Oracle Solaris SPARC | =11.3 | |
OpenSSH | =5.0 | |
OpenSSH | =5.0-p1 | |
OpenSSH | =5.1 | |
OpenSSH | =5.1-p1 | |
OpenSSH | =5.2 | |
OpenSSH | =5.2-p1 | |
OpenSSH | =5.3 | |
OpenSSH | =5.3-p1 | |
OpenSSH | =5.4 | |
OpenSSH | =5.4-p1 | |
OpenSSH | =5.5 | |
OpenSSH | =5.5-p1 | |
OpenSSH | =5.6 | |
OpenSSH | =5.6-p1 | |
OpenSSH | =5.7 | |
OpenSSH | =5.7-p1 | |
OpenSSH | =5.8 | |
OpenSSH | =5.8-p1 | |
OpenSSH | =5.9 | |
OpenSSH | =5.9-p1 | |
OpenSSH | =6.0 | |
OpenSSH | =6.0-p1 | |
OpenSSH | =6.1 | |
OpenSSH | =6.1-p1 | |
OpenSSH | =6.2 | |
OpenSSH | =6.2-p1 | |
OpenSSH | =6.2-p2 | |
OpenSSH | =6.3 | |
OpenSSH | =6.3-p1 | |
OpenSSH | =6.4 | |
OpenSSH | =6.4-p1 | |
OpenSSH | =6.5 | |
OpenSSH | =6.5-p1 | |
OpenSSH | =6.6 | |
OpenSSH | =6.6-p1 | |
OpenSSH | =6.7 | |
OpenSSH | =6.7-p1 | |
OpenSSH | =6.8 | |
OpenSSH | =6.8-p1 | |
OpenSSH | =6.9 | |
OpenSSH | =6.9-p1 | |
OpenSSH | =7.0 | |
OpenSSH | =7.0-p1 | |
OpenSSH | =7.1 | |
OpenSSH | =7.1-p1 | |
HP Remote Device Access Virtual Customer Access System | <=15.07 | |
Apple iOS and macOS | <=10.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0777 has been assigned a severity rating of high due to its ability to expose sensitive information from memory.
To fix CVE-2016-0777, upgrade OpenSSH to version 7.1p2 or later.
CVE-2016-0777 affects OpenSSH versions 5.x, 6.x, and 7.x before 7.1p2.
CVE-2016-0777 can allow remote servers to read sensitive information such as private keys from the process memory.
Yes, if you are using a version of OpenSSH prior to 7.1p2, your system is vulnerable to CVE-2016-0777.