Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10708

Опубликовано: 21 янв. 2018
Источник: debian
EPSS Низкий

Описание

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:7.4p1-1package

Примечания

  • https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737

  • http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html

  • Flaw is not crashing the whole sshd daemon, rather the privsep process

EPSS

Процентиль: 88%
0.03751
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

CVSS3: 5.3
redhat
около 8 лет назад

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

CVSS3: 7.5
nvd
около 8 лет назад

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

suse-cvrf
больше 7 лет назад

Security update for openssh

suse-cvrf
больше 7 лет назад

Security update for openssh

EPSS

Процентиль: 88%
0.03751
Низкий