AIX OpenSSH Advisory : openssh_advisory7.asc

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of OpenSSH installed that is
affected by multiple vulnerabilities.

Description :

The remote AIX host has a version of OpenSSH installed that is
affected by the following vulnerabilities :

- An information disclosure vulnerability exists in the
resend_bytes() function in the undocumented roaming
connection feature. An authenticated, remote attacker
can exploit this vulnerability, by persuading a victim
to connect to a malicious server, to retrieve private
cryptographic keys or other sensitive information.
(CVE-2016-0777)

- A heap-based buffer overflow condition exists in the
undocumented roaming connection feature due to improper
bounds checking of user-supplied input to the
packet_write_wait() and ssh_packet_write_wait()
functions whenever the non-default option ProxyCommand
is used with either ForwardAgent or ForwardX11. An
authenticated, remote attacker can exploit this
vulnerability, by persuading a victim to connect to a
malicious server, to execute arbitrary code or cause
a denial of service. (CVE-2016-0778)

See also :

http://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.1
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 88590 ()

Bugtraq ID: 80695
80698

CVE ID: CVE-2016-0777
CVE-2016-0778

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now