First published: Tue Dec 20 2016(Updated: )
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssh | <7.4 | 7.4 |
ubuntu/openssh | <1:6.6 | 1:6.6 |
ubuntu/openssh | <1:7.4 | 1:7.4 |
ubuntu/openssh | <1:7.2 | 1:7.2 |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.2p1-2+deb12u3 1:9.8p1-2 | |
OpenSSH | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10011 has a severity rating that indicates a potential risk of exposure of sensitive private-key information.
To fix CVE-2016-10011, upgrade your OpenSSH version to 7.4 or later.
OpenSSH versions prior to 7.4 are affected by CVE-2016-10011.
CVE-2016-10011 can potentially allow local users to access sensitive information but does not directly lead to unauthorized access.
CVE-2016-10011 is a local vulnerability that requires user access for exploitation.