MEDIUM · 6.5

CVE-2016-0777

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmissi...

Vulnerability Description

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

CVSS Score

6.5

MEDIUM

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
SophosUnified Threat Management Software9.318
SophosUnified Threat Management110
OracleLinux7
OracleSolaris11.3
OpenbsdOpenssh5.0
HpRemote Device Access Virtual Customer Access System<= 15.07
AppleMac Os X<= 10.11.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-0777?

CVE-2016-0777 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmissi...

How severe is CVE-2016-0777?

CVE-2016-0777 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-0777?

Check the references section above for vendor advisories and patch information. Affected products include: Sophos Unified Threat Management Software, Sophos Unified Threat Management, Oracle Linux, Oracle Solaris, Openbsd Openssh.