First published: Thu Sep 15 2016(Updated: )
A new version of dropbear was released fixing multiple vulnerabilities. References: <a href="http://seclists.org/oss-sec/2016/q3/504">http://seclists.org/oss-sec/2016/q3/504</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dropbear | <2016.74 | 2016.74 |
Dropbear SSH | <=2016.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7406 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2016-7406, update Dropbear SSH to version 2016.74 or higher.
CVE-2016-7406 affects Dropbear SSH versions prior to 2016.74.
Yes, CVE-2016-7406 can be exploited remotely by attackers via the format string vulnerability.
The impact of CVE-2016-7406 could include unauthorized execution of arbitrary code on affected systems.