First published: Sun Jan 21 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | <7.4 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Cloud Backup | ||
Netapp Data Ontap 7-mode | ||
Netapp Data Ontap Edge | ||
Netapp Oncommand Unified Manager Vsphere | >=9.4 | |
NetApp Service Processor | ||
Netapp Storagegrid | ||
NetApp StorageGRID Webscale | ||
NetApp Clustered Data ONTAP | ||
All of | ||
Netapp Vasa Provider | ||
NetApp Clustered Data ONTAP | ||
Netapp Vasa Provider | ||
NetApp Clustered Data ONTAP | ||
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.9p1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10708 is a vulnerability in OpenSSH that allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message.
The severity of CVE-2016-10708 is high with a severity value of 7.5.
To fix CVE-2016-10708, update OpenSSH to version 7.9p1-10+deb10u2, 7.9p1-10+deb10u3, 8.4p1-5+deb11u2, 9.2p1-2+deb12u1, or 9.4p1-1.
Yes, OpenSSH version 6.6 is vulnerable to CVE-2016-10708.
You can find more information about CVE-2016-10708 at the following references: http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html, http://www.securityfocus.com/bid/102780, https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737.