openSUSE Security Update : openssh (openSUSE-2016-49)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

- CVE-2016-0777: A malicious or compromised server could
cause the OpenSSH client to expose part or all of the
client's private key through the roaming feature
(bsc#961642)

- CVE-2016-0778: A malicious or compromised server could
could trigger a buffer overflow in the OpenSSH client
through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH
client and a commercial SSH server.

See also :

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-077
https://bugzilla.opensuse.org/show_bug.cgi?id=961642
https://bugzilla.opensuse.org/show_bug.cgi?id=961645

Solution :

Update the affected openssh packages.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 88157 ()

Bugtraq ID:

CVE ID: CVE-2016-0777
CVE-2016-0778

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now