First published: Tue Dec 20 2016(Updated: )
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssh | <7.4 | 7.4 |
ubuntu/openssh | <1:6.6 | 1:6.6 |
ubuntu/openssh | <1:7.4 | 1:7.4 |
ubuntu/openssh | <1:7.2 | 1:7.2 |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.2p1-2+deb12u3 1:9.8p1-2 | |
OpenSSH | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10009 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2016-10009, upgrade OpenSSH to version 7.4 or later on affected systems.
CVE-2016-10009 exploits an untrusted search path vulnerability in ssh-agent allowing remote execution of malicious local PKCS#11 modules.
OpenSSH versions prior to 7.4 are affected by CVE-2016-10009.
CVE-2016-10009 can facilitate remote attacks allowing unauthorized access and execution of local code through agent forwarding.