First published: Fri Mar 03 2017(Updated: )
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbear SSH | <=2016.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7408 has been classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2016-7408, upgrade Dropbear SSH to version 2016.74 or later.
The potential impact of CVE-2016-7408 includes unauthorized remote execution of arbitrary code on affected systems.
Versions of Dropbear SSH before 2016.74 are affected by CVE-2016-7408.
CVE-2016-7408 can be exploited by remote attackers who send crafted arguments to the dbclient.