Search criteria

3 vulnerabilities found for remote_device_access_virtual_customer_access_system by hp

FKIE_CVE-2016-0777

Vulnerability from fkie_nvd - Published: 2016-01-14 22:59 - Updated: 2025-04-12 10:46
Summary
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
References
secalert@redhat.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.htmlThird Party Advisory, VDB Entry
secalert@redhat.comhttp://seclists.org/fulldisclosure/2016/Jan/44Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3446Third Party Advisory
secalert@redhat.comhttp://www.openssh.com/txt/release-7.1p2Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/01/14/7Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/537295/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/80695Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1034671Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2869-1Third Party Advisory
secalert@redhat.comhttps://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/Third Party Advisory
secalert@redhat.comhttps://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/Third Party Advisory
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa109Third Party Advisory
secalert@redhat.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722Third Party Advisory
secalert@redhat.comhttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.ascThird Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201601-01Third Party Advisory
secalert@redhat.comhttps://support.apple.com/HT206167Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2016/Jan/44Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3446Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openssh.com/txt/release-7.1p2Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/01/14/7Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/537295/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/80695Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034671Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2869-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa109Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201601-01Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT206167Third Party Advisory

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sophos:unified_threat_management_software:9.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA93870-577B-4D53-A61D-22E024F96B16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*",
              "matchCriteriaId": "9857D3A8-7942-4624-B3D6-9943D34030B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:110:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9D7BF2E-1DEB-474A-8DEE-0A2D1A9B1A77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:120:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE59783E-6A2D-4777-9BA2-8527DA6B32BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:220:*:*:*:*:*:*:*",
              "matchCriteriaId": "646FEB9F-2F54-4946-9687-C2EC28144C97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:320:*:*:*:*:*:*:*",
              "matchCriteriaId": "57654458-F143-4D70-9D52-0A242F3177A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:425:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6527EC0-536E-4BF0-9949-8FA4A4E64688",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:525:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A9EA52-E9F1-4267-86BC-570ED1ECC7B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:sophos:unified_threat_management:625:*:*:*:*:*:*:*",
              "matchCriteriaId": "280976E2-D7A8-43B7-A57C-66920BC91DAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
              "matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D13E08-7B08-44AA-9017-3EE3F6301E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "727CC471-6473-4C8D-8D1A-D8B3C6AB21CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBC7FF1-01EE-40A1-8735-14360A371803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDBF5F-23BD-4A60-926A-B822D5E3BFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "987527F8-8A42-4729-A329-4D2AC8AFD6E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "CAF922B2-2FE6-4401-A4F1-914C637F5450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "93910448-8D6F-4F7E-9C7F-959754ABA50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.3:p1:*:*:*:*:*:*",
              "matchCriteriaId": "4ECE74F4-8E7B-42FA-A2DD-2EE0681DA4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3356FDFD-BEA5-45A5-A36B-D1153AFE6C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*",
              "matchCriteriaId": "AA9D704A-D1E7-4989-9136-1EAD72EF6BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9394B8AD-AB22-4955-8774-C6BA2B56A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*",
              "matchCriteriaId": "78735121-6BA0-4158-B3D5-E4BACCA5E95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D4A9B-1194-4D63-AAC2-8701C890BB0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*",
              "matchCriteriaId": "270BABBA-70A8-4FC7-962D-0D0D40F4497F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75DB5AE-E99D-4827-B290-823E015AEE34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A710EC9F-1352-4DF0-B1CF-9C51ACB078CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA4F797B-8E2C-41AC-AA29-D6B50A539B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "7F482203-0CF1-403C-A25C-9B0DA24F6282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E74684E-71D3-4458-A8BA-5248982273F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*",
              "matchCriteriaId": "9F3D478C-221F-4A07-8520-CD8856A75DCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9754B4A-3042-49B8-86F7-2D60E25400C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B018B05B-1311-4E0F-A9D0-620C1BF904A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3872787F-2C1C-40C0-B9CF-A3C0CEAAB400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "728372F8-6561-473D-B54D-1DB41DA1CF55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39D1E296-3040-4CC9-B95B-3E07D73F1150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "11BDA49F-C3E7-4D32-8105-E75525BFB2D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "CE153B9F-721D-42ED-A662-C2597B7BF073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCEE2677-16EE-484F-B2FB-FCA377E0D76B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*",
              "matchCriteriaId": "254243DD-2E3E-48ED-A92C-8F4FD405DA57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "90798B9A-A1C6-4EC5-96BF-AF9C6FEFB63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BCF734D8-1F01-498C-A917-5B528BFD9CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8ABE51-1535-44D9-B2A1-CC91021A29D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*",
              "matchCriteriaId": "492F661C-45E4-4B9B-AD26-1873D91DBEA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "546EB570-C2AC-473B-BED8-C47167D2593A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*",
              "matchCriteriaId": "CA2C8269-9C66-4E41-A56C-ACC709DC2053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64382F2C-15AC-41FE-A936-CEB44C1AFB9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*",
              "matchCriteriaId": "20B099B9-3D7E-47A4-94A5-B89759189D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "65A8629A-CFAE-4403-BEE7-622912483702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "50836FA3-8116-4D58-B73E-B4830FB3A551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0607649-62FE-41CB-9444-53CD9C5B67C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3397D8DC-3410-401F-8854-BFCC35AD6686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B0FB8D5-75CB-4691-AB9F-B4FA46973421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "42DCED2D-76C5-49D1-A72D-E578CF686F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E1B240-BD86-41D3-BAC1-96005CB31DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "4BFC8587-FB9E-4FE2-B725-81CE3CE590F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:remote_device_access_virtual_customer_access_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E172D760-1D72-4712-8A80-E9FB5B076E7F",
              "versionEndIncluding": "15.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82",
              "versionEndIncluding": "10.11.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n resend_bytes en roaming_common.c en el cliente en OpenSSH 5.x, 6.x y 7.x en versiones anteriores a 7.1p2 permite a servidores remotos obtener informaci\u00f3n sensible desde la memoria de proceso mediante la petici\u00f3n de transmisi\u00f3n de un buffer completo, seg\u00fan lo demostrado mediante la lectura de una clave privada."
    }
  ],
  "id": "CVE-2016-0777",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-01-14T22:59:01.140",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3446"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openssh.com/txt/release-7.1p2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/80695"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034671"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2869-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa109"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201601-01"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT206167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openssh.com/txt/release-7.1p2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/80695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2869-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201601-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT206167"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2016-0777 (GCVE-0-2016-0777)

Vulnerability from cvelistv5 – Published: 2016-01-14 00:00 – Updated: 2024-08-05 22:30
VLAI?
Summary
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://blogs.sophos.com/2016/02/17/utm-up2date-9…
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
https://blogs.sophos.com/2016/02/29/utm-up2date-9…
http://lists.apple.com/archives/security-announce… vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
http://www.securityfocus.com/archive/1/537295/100… mailing-list
https://support.apple.com/HT206167
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
http://kb.juniper.net/InfoCenter/index?page=conte…
http://www.securityfocus.com/bid/80695 vdb-entry
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
https://security.FreeBSD.org/advisories/FreeBSD-S… vendor-advisory
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
http://www.oracle.com/technetwork/topics/security…
http://www.openssh.com/txt/release-7.1p2
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
https://bto.bluecoat.com/security-advisory/sa109
http://www.securitytracker.com/id/1034671 vdb-entry
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
https://security.gentoo.org/glsa/201601-01 vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
http://www.openwall.com/lists/oss-security/2016/01/14/7 mailing-list
http://seclists.org/fulldisclosure/2016/Jan/44 mailing-list
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://packetstormsecurity.com/files/135273/Qualy…
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://www.ubuntu.com/usn/USN-2869-1 vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
http://www.oracle.com/technetwork/topics/security…
http://www.debian.org/security/2016/dsa-3446 vendor-advisory
https://cert-portal.siemens.com/productcert/pdf/s…
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:30:04.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
          },
          {
            "name": "SUSE-SU-2016:0117",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
          },
          {
            "name": "APPLE-SA-2016-03-21-5",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
          },
          {
            "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/HT206167"
          },
          {
            "name": "FEDORA-2016-4556904561",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
          },
          {
            "name": "80695",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/80695"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "FreeBSD-SA-16:07",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
          },
          {
            "name": "FEDORA-2016-c330264861",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openssh.com/txt/release-7.1p2"
          },
          {
            "name": "openSUSE-SU-2016:0128",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
          },
          {
            "name": "FEDORA-2016-2e89eba0c1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa109"
          },
          {
            "name": "1034671",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034671"
          },
          {
            "name": "openSUSE-SU-2016:0127",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
          },
          {
            "name": "GLSA-201601-01",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201601-01"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
          },
          {
            "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
          },
          {
            "name": "SUSE-SU-2016:0119",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
          },
          {
            "name": "SUSE-SU-2016:0118",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
          },
          {
            "name": "FEDORA-2016-67c6ef0d4f",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
          },
          {
            "name": "SUSE-SU-2016:0120",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
          },
          {
            "name": "USN-2869-1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2869-1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
          },
          {
            "name": "DSA-3446",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3446"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-13T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
        },
        {
          "name": "SUSE-SU-2016:0117",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
        },
        {
          "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
        },
        {
          "name": "APPLE-SA-2016-03-21-5",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
        },
        {
          "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
        },
        {
          "url": "https://support.apple.com/HT206167"
        },
        {
          "name": "FEDORA-2016-4556904561",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
        },
        {
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
        },
        {
          "name": "80695",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securityfocus.com/bid/80695"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "FreeBSD-SA-16:07",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
        },
        {
          "name": "FEDORA-2016-c330264861",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
        },
        {
          "url": "http://www.openssh.com/txt/release-7.1p2"
        },
        {
          "name": "openSUSE-SU-2016:0128",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
        },
        {
          "name": "FEDORA-2016-2e89eba0c1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
        },
        {
          "url": "https://bto.bluecoat.com/security-advisory/sa109"
        },
        {
          "name": "1034671",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1034671"
        },
        {
          "name": "openSUSE-SU-2016:0127",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
        },
        {
          "name": "GLSA-201601-01",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/201601-01"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
        },
        {
          "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
        },
        {
          "name": "SUSE-SU-2016:0119",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
        },
        {
          "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
        },
        {
          "name": "SUSE-SU-2016:0118",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
        },
        {
          "name": "FEDORA-2016-67c6ef0d4f",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
        },
        {
          "name": "SUSE-SU-2016:0120",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
        },
        {
          "name": "USN-2869-1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2869-1"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
        },
        {
          "name": "DSA-3446",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3446"
        },
        {
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-0777",
    "datePublished": "2016-01-14T00:00:00",
    "dateReserved": "2015-12-16T00:00:00",
    "dateUpdated": "2024-08-05T22:30:04.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-0777 (GCVE-0-2016-0777)

Vulnerability from nvd – Published: 2016-01-14 00:00 – Updated: 2024-08-05 22:30
VLAI?
Summary
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://blogs.sophos.com/2016/02/17/utm-up2date-9…
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
https://blogs.sophos.com/2016/02/29/utm-up2date-9…
http://lists.apple.com/archives/security-announce… vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
http://www.securityfocus.com/archive/1/537295/100… mailing-list
https://support.apple.com/HT206167
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
http://kb.juniper.net/InfoCenter/index?page=conte…
http://www.securityfocus.com/bid/80695 vdb-entry
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
https://security.FreeBSD.org/advisories/FreeBSD-S… vendor-advisory
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
http://www.oracle.com/technetwork/topics/security…
http://www.openssh.com/txt/release-7.1p2
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
https://bto.bluecoat.com/security-advisory/sa109
http://www.securitytracker.com/id/1034671 vdb-entry
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
https://security.gentoo.org/glsa/201601-01 vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
http://www.openwall.com/lists/oss-security/2016/01/14/7 mailing-list
http://seclists.org/fulldisclosure/2016/Jan/44 mailing-list
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://packetstormsecurity.com/files/135273/Qualy…
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://lists.fedoraproject.org/pipermail/package-… vendor-advisory
http://lists.opensuse.org/opensuse-security-annou… vendor-advisory
http://www.ubuntu.com/usn/USN-2869-1 vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/publ…
http://www.oracle.com/technetwork/topics/security…
http://www.debian.org/security/2016/dsa-3446 vendor-advisory
https://cert-portal.siemens.com/productcert/pdf/s…
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:30:04.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
          },
          {
            "name": "SUSE-SU-2016:0117",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
          },
          {
            "name": "APPLE-SA-2016-03-21-5",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
          },
          {
            "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/HT206167"
          },
          {
            "name": "FEDORA-2016-4556904561",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
          },
          {
            "name": "80695",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/80695"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
          },
          {
            "name": "FreeBSD-SA-16:07",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
          },
          {
            "name": "FEDORA-2016-c330264861",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openssh.com/txt/release-7.1p2"
          },
          {
            "name": "openSUSE-SU-2016:0128",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
          },
          {
            "name": "FEDORA-2016-2e89eba0c1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa109"
          },
          {
            "name": "1034671",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034671"
          },
          {
            "name": "openSUSE-SU-2016:0127",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
          },
          {
            "name": "GLSA-201601-01",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201601-01"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
          },
          {
            "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
          },
          {
            "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
          },
          {
            "name": "SUSE-SU-2016:0119",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
          },
          {
            "name": "SUSE-SU-2016:0118",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
          },
          {
            "name": "FEDORA-2016-67c6ef0d4f",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
          },
          {
            "name": "SUSE-SU-2016:0120",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
          },
          {
            "name": "USN-2869-1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2869-1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
          },
          {
            "name": "DSA-3446",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3446"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-13T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"
        },
        {
          "name": "SUSE-SU-2016:0117",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"
        },
        {
          "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"
        },
        {
          "name": "APPLE-SA-2016-03-21-5",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"
        },
        {
          "name": "20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.securityfocus.com/archive/1/537295/100/0/threaded"
        },
        {
          "url": "https://support.apple.com/HT206167"
        },
        {
          "name": "FEDORA-2016-4556904561",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"
        },
        {
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734"
        },
        {
          "name": "80695",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securityfocus.com/bid/80695"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
        },
        {
          "name": "FreeBSD-SA-16:07",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"
        },
        {
          "name": "FEDORA-2016-c330264861",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
        },
        {
          "url": "http://www.openssh.com/txt/release-7.1p2"
        },
        {
          "name": "openSUSE-SU-2016:0128",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"
        },
        {
          "name": "FEDORA-2016-2e89eba0c1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"
        },
        {
          "url": "https://bto.bluecoat.com/security-advisory/sa109"
        },
        {
          "name": "1034671",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1034671"
        },
        {
          "name": "openSUSE-SU-2016:0127",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"
        },
        {
          "name": "GLSA-201601-01",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/201601-01"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
        },
        {
          "name": "[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/14/7"
        },
        {
          "name": "20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/Jan/44"
        },
        {
          "name": "SUSE-SU-2016:0119",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"
        },
        {
          "url": "http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"
        },
        {
          "name": "SUSE-SU-2016:0118",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"
        },
        {
          "name": "FEDORA-2016-67c6ef0d4f",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"
        },
        {
          "name": "SUSE-SU-2016:0120",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"
        },
        {
          "name": "USN-2869-1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2869-1"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
        },
        {
          "name": "DSA-3446",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3446"
        },
        {
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-0777",
    "datePublished": "2016-01-14T00:00:00",
    "dateReserved": "2015-12-16T00:00:00",
    "dateUpdated": "2024-08-05T22:30:04.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}