Уязвимость CVE-2016-0778: Информация

Описание

The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.

Важность: HIGH (8,1) Вектор: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Опубликовано: 15 января 2016 г.
Изменено: 13 декабря 2022 г.
Идентификатор типа ошибки: CWE-119

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
opensshsisyphus7.2p1-alt19.6p1-alt1ALT-PU-2016-1200-1160498Исправлено
opensshp107.2p1-alt17.9p1-alt4.p10.6ALT-PU-2016-1200-1160498Исправлено
opensshp97.2p1-alt17.9p1-alt1ALT-PU-2016-1200-1160498Исправлено
opensshc10f17.2p1-alt17.9p1-alt4.p10.6ALT-PU-2016-1200-1160498Исправлено
opensshc9f27.2p1-alt17.9p1-alt4.p10.6ALT-PU-2016-1200-1160498Исправлено
opensshc75.9p1-alt7.M70C.16.7p1-alt1.M70C.5ALT-PU-2016-1074-1156802Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
http://www.openssh.com/txt/release-7.1p2
  • Patch
  • Release Notes
  • Vendor Advisory
[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
  • Exploit
  • Mailing List
  • Technical Description
  • Third Party Advisory
https://support.apple.com/HT206167
  • Vendor Advisory
APPLE-SA-2016-03-21-5
  • Mailing List
  • Release Notes
  • Third Party Advisory
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
  • Release Notes
  • Vendor Advisory
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
  • Release Notes
  • Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
  • Third Party Advisory
80698
  • Third Party Advisory
  • VDB Entry
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
  • Third Party Advisory
FEDORA-2016-2e89eba0c1
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:0127
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0119
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0117
  • Mailing List
  • Third Party Advisory
20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
  • Mailing List
  • Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa109
  • Third Party Advisory
DSA-3446
  • Third Party Advisory
USN-2869-1
  • Third Party Advisory
GLSA-201601-01
  • Third Party Advisory
1034671
  • Third Party Advisory
  • VDB Entry
SUSE-SU-2016:0118
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:0128
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0120
  • Mailing List
  • Third Party Advisory
http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
  • Third Party Advisory
  • VDB Entry
FEDORA-2016-4556904561
  • Mailing List
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
  • Third Party Advisory
20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
  • Third Party Advisory
  • VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
      1. Конфигурация 1

        cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

        cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*

        Конфигурация 2

        cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*

        cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*

        Конфигурация 3

        cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
        Start including
        10.9.0
        End including
        10.9.5

        cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
        Start including
        10.10.0
        End including
        10.10.5

        cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
        Start including
        10.11.0
        End including
        10.11.3

        Конфигурация 4

        cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*
        End including
        15.07

        Конфигурация 5

        cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*