CVE-2016-0777
14.01.2016, 22:59
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.Enginsight
| Vendor | Product | Version |
|---|---|---|
| sophos | unified_threat_management_software | 9.318 |
| sophos | unified_threat_management_software | 9.353 |
| oracle | solaris | 11.3 |
| openbsd | openssh | 5.0 |
| openbsd | openssh | 5.0:p1 |
| openbsd | openssh | 5.1 |
| openbsd | openssh | 5.1:p1 |
| openbsd | openssh | 5.2 |
| openbsd | openssh | 5.2:p1 |
| openbsd | openssh | 5.3 |
| openbsd | openssh | 5.3:p1 |
| openbsd | openssh | 5.4 |
| openbsd | openssh | 5.4:p1 |
| openbsd | openssh | 5.5 |
| openbsd | openssh | 5.5:p1 |
| openbsd | openssh | 5.6 |
| openbsd | openssh | 5.6:p1 |
| openbsd | openssh | 5.7 |
| openbsd | openssh | 5.7:p1 |
| openbsd | openssh | 5.8 |
| openbsd | openssh | 5.8:p1 |
| openbsd | openssh | 5.9 |
| openbsd | openssh | 5.9:p1 |
| openbsd | openssh | 6.0 |
| openbsd | openssh | 6.0:p1 |
| openbsd | openssh | 6.1 |
| openbsd | openssh | 6.1:p1 |
| openbsd | openssh | 6.2 |
| openbsd | openssh | 6.2:p1 |
| openbsd | openssh | 6.2:p2 |
| openbsd | openssh | 6.3 |
| openbsd | openssh | 6.3:p1 |
| openbsd | openssh | 6.4 |
| openbsd | openssh | 6.4:p1 |
| openbsd | openssh | 6.5 |
| openbsd | openssh | 6.5:p1 |
| openbsd | openssh | 6.6 |
| openbsd | openssh | 6.6:p1 |
| openbsd | openssh | 6.7 |
| openbsd | openssh | 6.7:p1 |
| openbsd | openssh | 6.8 |
| openbsd | openssh | 6.8:p1 |
| openbsd | openssh | 6.9 |
| openbsd | openssh | 6.9:p1 |
| openbsd | openssh | 7.0 |
| openbsd | openssh | 7.0:p1 |
| openbsd | openssh | 7.1 |
| openbsd | openssh | 7.1:p1 |
| hp | remote_device_access_virtual_customer_access_system | 𝑥 ≤ 15.07 |
| apple | mac_os_x | 𝑥 ≤ 10.11.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References