Executive Summary
Summary | |
---|---|
Title | OpenSSH Client contains a client information leak vulnerability and buffer overflow |
Informations | |||
---|---|---|---|
Name | VU#456088 | First vendor Publication | 2016-01-14 |
Vendor | VU-CERT | Last vendor Modification | 2016-01-20 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 3.9 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#456088OpenSSH Client contains a client information leak vulnerability and buffer overflowOverviewOpenSSH client code versions 5.4 through 7.1p1 contains a client information leak vulnerability that could allow an OpenSSH client to leak information not limited to but including private keys, as well as a buffer overflow in certain non-default configurations. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThis issue was previously coordinated and publicly disclosed by the Qualys Security Advisory Team. This document was written by Brian Gardiner and Garret Wassermann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/456088 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-200 | Information Exposure |
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | OpenSSH insecure roaming key exchange attempt RuleID : 37371 - Revision : 3 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-22 | Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit... File : macosx_SecUpd2016-002.nasl - Type : ACT_GATHER_INFO |
2016-03-22 | Name : The remote Mac OS X host is affected by multiple vulnerabilities. File : macosx_10_11_4.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote Fedora host is missing a security update. File : fedora_2016-c330264861.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote Fedora host is missing a security update. File : fedora_2016-67c6ef0d4f.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote Fedora host is missing a security update. File : fedora_2016-2e89eba0c1.nasl - Type : ACT_GATHER_INFO |
2016-02-05 | Name : The remote AIX host has a version of OpenSSH installed that is affected by mu... File : aix_openssh_advisory7.nasl - Type : ACT_GATHER_INFO |
2016-01-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-4556904561.nasl - Type : ACT_GATHER_INFO |
2016-01-26 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-49.nasl - Type : ACT_GATHER_INFO |
2016-01-25 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-39.nasl - Type : ACT_GATHER_INFO |
2016-01-25 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-38.nasl - Type : ACT_GATHER_INFO |
2016-01-19 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-638.nasl - Type : ACT_GATHER_INFO |
2016-01-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201601-01.nasl - Type : ACT_GATHER_INFO |
2016-01-18 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-0120-1.nasl - Type : ACT_GATHER_INFO |
2016-01-18 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-0119-1.nasl - Type : ACT_GATHER_INFO |
2016-01-18 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-0118-1.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2016-014-01.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2869-1.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160114_openssh_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-0043.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-0043.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_dfe0cdc1baf211e5863ab499baebfeaf.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3446.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote Debian host is missing a security update. File : debian_DLA-387.nasl - Type : ACT_GATHER_INFO |
2016-01-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-0043.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-09-09 00:24:22 |
|
2016-02-06 13:26:47 |
|
2016-01-21 21:27:51 |
|
2016-01-21 00:26:10 |
|
2016-01-21 00:21:33 |
|
2016-01-20 21:26:13 |
|
2016-01-20 00:26:14 |
|
2016-01-15 21:23:22 |
|
2016-01-15 05:27:44 |
|
2016-01-15 00:22:10 |
|
2016-01-14 21:24:27 |
|