CVE-2016-0777
14.01.2016, 22:59
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.Enginsight
Vendor | Product | Version |
---|---|---|
sophos | unified_threat_management_software | 9.318 |
sophos | unified_threat_management_software | 9.353 |
oracle | solaris | 11.3 |
openbsd | openssh | 5.0 |
openbsd | openssh | 5.0 |
openbsd | openssh | 5.1 |
openbsd | openssh | 5.1 |
openbsd | openssh | 5.2 |
openbsd | openssh | 5.2 |
openbsd | openssh | 5.3 |
openbsd | openssh | 5.3 |
openbsd | openssh | 5.4 |
openbsd | openssh | 5.4 |
openbsd | openssh | 5.5 |
openbsd | openssh | 5.5 |
openbsd | openssh | 5.6 |
openbsd | openssh | 5.6 |
openbsd | openssh | 5.7 |
openbsd | openssh | 5.7 |
openbsd | openssh | 5.8 |
openbsd | openssh | 5.8 |
openbsd | openssh | 5.9 |
openbsd | openssh | 5.9 |
openbsd | openssh | 6.0 |
openbsd | openssh | 6.0 |
openbsd | openssh | 6.1 |
openbsd | openssh | 6.1 |
openbsd | openssh | 6.2 |
openbsd | openssh | 6.2 |
openbsd | openssh | 6.2 |
openbsd | openssh | 6.3 |
openbsd | openssh | 6.3 |
openbsd | openssh | 6.4 |
openbsd | openssh | 6.4 |
openbsd | openssh | 6.5 |
openbsd | openssh | 6.5 |
openbsd | openssh | 6.6 |
openbsd | openssh | 6.6 |
openbsd | openssh | 6.7 |
openbsd | openssh | 6.7 |
openbsd | openssh | 6.8 |
openbsd | openssh | 6.8 |
openbsd | openssh | 6.9 |
openbsd | openssh | 6.9 |
openbsd | openssh | 7.0 |
openbsd | openssh | 7.0 |
openbsd | openssh | 7.1 |
openbsd | openssh | 7.1 |
hp | remote_device_access_virtual_customer_access_system | 𝑥 ≤ 15.07 |
apple | mac_os_x | 𝑥 ≤ 10.11.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References