VID |
14127 |
Severity |
30 |
Port |
22 |
Protocol |
TCP |
Class |
SSH |
Detailed Description |
The OpenSSH, according to its banner, the version of OpenSSH running on the remote host is 5.x, 6.x or 7.x prior to 7.1p2. It is, therefore, affected by multiple vulnerabilities.
- A potential information disclosure vulnerability which may allow remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer (CVE-2016-0777)
- A denial of service vulnerability due to a heap-base overflow in roaming_common.c (CVE-2016-07778)
* Note: This check solely relied on the banner of the remote OpenSSH server to assess this vulnerability, so this might be a false positive.
* References: http://www.openssh.com/txt/release-7.1p2
* Platforms Affected: OpenSSH prior to 7.1p2 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of OpenSSH (7.1p2 or later), available from the OpenSSH Web site at http://www.openssh.org/ |
Related URL |
CVE-2016-0777,CVE-2016-0778 (CVE) |
Related URL |
80695,80698 (SecurityFocus) |
Related URL |
(ISS) |
|