Lucene search

K
f5F5F5:K01131113
HistoryJan 28, 2016 - 12:00 a.m.

K01131113 : OpenSSH vulnerabilities CVE-2016-0777 and CVE-2016-0778

2016-01-2800:00:00
my.f5.com
143

7.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%

Security Advisory Description

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
Impact
There is no impact. F5 products are not affected by this vulnerability.