First published: Tue Jan 19 2016(Updated: )
Last updated 24 July 2024
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.8p1-8 | |
OpenSSH | =6.8 | |
OpenSSH | =6.8-p1 | |
OpenSSH | =6.9 | |
OpenSSH | =6.9-p1 | |
OpenSSH | =7.0 | |
OpenSSH | =7.0-p1 | |
OpenSSH | =7.1 | |
OpenSSH | =7.1-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1907 is classified as a denial of service vulnerability that can cause application crashes.
To fix CVE-2016-1907, update OpenSSH to versions 7.1p2 or later.
OpenSSH versions before 7.1p2 are affected by CVE-2016-1907.
Yes, CVE-2016-1907 can be exploited remotely through crafted network traffic.
Attackers can cause an out-of-bounds read and crash the OpenSSH application using CVE-2016-1907.