CVE-2016-0778

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.

References

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734

http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html

http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html

http://seclists.org/fulldisclosure/2016/Jan/44

http://www.debian.org/security/2016/dsa-3446

http://www.openssh.com/txt/release-7.1p2

http://www.openwall.com/lists/oss-security/2016/01/14/7

http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

http://www.securityfocus.com/archive/1/537295/100/0/threaded

http://www.securityfocus.com/bid/80698

http://www.securitytracker.com/id/1034671

http://www.ubuntu.com/usn/USN-2869-1

https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/

https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/

https://bto.bluecoat.com/security-advisory/sa109

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

https://security.gentoo.org/glsa/201601-01

https://support.apple.com/HT206167

Details

Source: MITRE

Published: 2016-01-14

Updated: 2019-12-27

Type: CWE-119

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.2

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from 10.9.0 to 10.9.5 (inclusive)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from 10.10.0 to 10.10.5 (inclusive)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from 10.11.0 to 10.11.3 (inclusive)

Configuration 4

OR

cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:* versions up to 15.07 (inclusive)

Configuration 5

OR

cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*

Tenable Plugins

View all (26 total)

IDNameProductFamilySeverity
106608OpenSSH 5.4 < 7.1p2 Multiple VulnerabilitiesNessusMisc.
high
106499pfSense < 2.3 Multiple Vulnerabilities (SA-16_01 - SA-16_02)NessusFirewalls
critical
9327Mac OS X 10.11.x < 10.11.4 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
90097Mac OS X 10.9.5 / 10.10.5 Multiple Vulnerabilities (Security Update 2016-002)NessusMacOS X Local Security Checks
critical
90096Mac OS X 10.11.x < 10.11.4 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
89505Fedora 22 : gsi-openssh-6.9p1-7.fc22 (2016-2e89eba0c1)NessusFedora Local Security Checks
high
88590AIX OpenSSH Advisory : openssh_advisory7.ascNessusAIX Local Security Checks
medium
88464Fedora 23 : gsi-openssh-7.1p2-1.fc23 (2016-4556904561)NessusFedora Local Security Checks
high
88157openSUSE Security Update : openssh (openSUSE-2016-49)NessusSuSE Local Security Checks
high
88129openSUSE Security Update : openssh (openSUSE-2016-39)NessusSuSE Local Security Checks
high
88128openSUSE Security Update : openssh (openSUSE-2016-38)NessusSuSE Local Security Checks
high
87985GLSA-201601-01 : OpenSSH: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
87972Amazon Linux AMI : openssh (ALAS-2016-638)NessusAmazon Linux Local Security Checks
high
87963SUSE SLED11 / SLES11 Security Update : openssh (SUSE-SU-2016:0120-1)NessusSuSE Local Security Checks
high
87962SUSE SLED11 / SLES11 Security Update : openssh (SUSE-SU-2016:0119-1)NessusSuSE Local Security Checks
high
87961SUSE SLED12 / SLES12 Security Update : openssh (SUSE-SU-2016:0118-1)NessusSuSE Local Security Checks
high
9055OpenSSH < 7.1p2 Multiple VulnerabilitiesNessus Network MonitorSSH
medium
87939Ubuntu 12.04 LTS / 14.04 LTS / 15.04 / 15.10 : openssh vulnerabilities (USN-2869-1)NessusUbuntu Local Security Checks
high
87938Scientific Linux Security Update : openssh on SL7.x x86_64 (20160114)NessusScientific Linux Local Security Checks
high
87937RHEL 7 : openssh (RHSA-2016:0043)NessusRed Hat Local Security Checks
high
87936Oracle Linux 7 : openssh (ELSA-2016-0043)NessusOracle Linux Local Security Checks
high
87935FreeBSD : openssh -- information disclosure (dfe0cdc1-baf2-11e5-863a-b499baebfeaf)NessusFreeBSD Local Security Checks
high
87934Debian DSA-3446-1 : openssh - security updateNessusDebian Local Security Checks
high
87933Debian DLA-387-1 : openssh security updateNessusDebian Local Security Checks
high
87930CentOS 7 : openssh (CESA-2016:0043)NessusCentOS Local Security Checks
high
87929Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : openssh (SSA:2016-014-01)NessusSlackware Local Security Checks
high