6.5

CVE-2016-0777

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

Data is provided by the National Vulnerability Database (NVD)
SophosUnified Threat Management Software Version9.318
   SophosUnified Threat Management Version110
   SophosUnified Threat Management Version120
   SophosUnified Threat Management Version220
   SophosUnified Threat Management Version320
   SophosUnified Threat Management Version425
   SophosUnified Threat Management Version525
   SophosUnified Threat Management Version625
SophosUnified Threat Management Software Version9.353
   SophosUnified Threat Management Version110
   SophosUnified Threat Management Version120
   SophosUnified Threat Management Version220
   SophosUnified Threat Management Version320
   SophosUnified Threat Management Version425
   SophosUnified Threat Management Version525
   SophosUnified Threat Management Version625
OracleLinux Version7
OracleSolaris Version11.3
OpenbsdOpenssh Version5.0
OpenbsdOpenssh Version5.0 Updatep1
OpenbsdOpenssh Version5.1
OpenbsdOpenssh Version5.1 Updatep1
OpenbsdOpenssh Version5.2
OpenbsdOpenssh Version5.2 Updatep1
OpenbsdOpenssh Version5.3
OpenbsdOpenssh Version5.3 Updatep1
OpenbsdOpenssh Version5.4
OpenbsdOpenssh Version5.4 Updatep1
OpenbsdOpenssh Version5.5
OpenbsdOpenssh Version5.5 Updatep1
OpenbsdOpenssh Version5.6
OpenbsdOpenssh Version5.6 Updatep1
OpenbsdOpenssh Version5.7
OpenbsdOpenssh Version5.7 Updatep1
OpenbsdOpenssh Version5.8
OpenbsdOpenssh Version5.8 Updatep1
OpenbsdOpenssh Version5.9
OpenbsdOpenssh Version5.9 Updatep1
OpenbsdOpenssh Version6.0
OpenbsdOpenssh Version6.0 Updatep1
OpenbsdOpenssh Version6.1
OpenbsdOpenssh Version6.1 Updatep1
OpenbsdOpenssh Version6.2
OpenbsdOpenssh Version6.2 Updatep1
OpenbsdOpenssh Version6.2 Updatep2
OpenbsdOpenssh Version6.3
OpenbsdOpenssh Version6.3 Updatep1
OpenbsdOpenssh Version6.4
OpenbsdOpenssh Version6.4 Updatep1
OpenbsdOpenssh Version6.5
OpenbsdOpenssh Version6.5 Updatep1
OpenbsdOpenssh Version6.6
OpenbsdOpenssh Version6.6 Updatep1
OpenbsdOpenssh Version6.7
OpenbsdOpenssh Version6.7 Updatep1
OpenbsdOpenssh Version6.8
OpenbsdOpenssh Version6.8 Updatep1
OpenbsdOpenssh Version6.9
OpenbsdOpenssh Version6.9 Updatep1
OpenbsdOpenssh Version7.0
OpenbsdOpenssh Version7.0 Updatep1
OpenbsdOpenssh Version7.1
OpenbsdOpenssh Version7.1 Updatep1
ApplemacOS X Version <= 10.11.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 67.2% 0.985
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

http://seclists.org/fulldisclosure/2016/Jan/44
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/80695
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1034671
Third Party Advisory
VDB Entry