First published: Fri Mar 03 2017(Updated: )
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbear SSH | <=2016.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7409 has a severity rating that indicates it can allow local users to exploit the system for unauthorized access to sensitive process memory.
To fix CVE-2016-7409, you should upgrade Dropbear SSH to version 2016.74 or later, where the vulnerability is patched.
CVE-2016-7409 affects local users of Dropbear SSH versions prior to 2016.74 when compiled with DEBUG_TRACE enabled.
CVE-2016-7409 is a local privilege escalation vulnerability that allows users to read process memory.
CVE-2016-7409 cannot be exploited remotely as it requires local access to the system.