{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-0777","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-05T22:30:04.441Z","dateReserved":"2015-12-16T00:00:00.000Z","datePublished":"2016-01-14T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-12-13T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"},{"name":"SUSE-SU-2016:0117","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"},{"url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"},{"name":"APPLE-SA-2016-03-21-5","tags":["vendor-advisory"],"url":"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"},{"name":"20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778","tags":["mailing-list"],"url":"http://www.securityfocus.com/archive/1/537295/100/0/threaded"},{"url":"https://support.apple.com/HT206167"},{"name":"FEDORA-2016-4556904561","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734"},{"name":"80695","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/80695"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"},{"name":"FreeBSD-SA-16:07","tags":["vendor-advisory"],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"},{"name":"FEDORA-2016-c330264861","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"url":"http://www.openssh.com/txt/release-7.1p2"},{"name":"openSUSE-SU-2016:0128","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"},{"name":"FEDORA-2016-2e89eba0c1","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"},{"url":"https://bto.bluecoat.com/security-advisory/sa109"},{"name":"1034671","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1034671"},{"name":"openSUSE-SU-2016:0127","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"},{"name":"GLSA-201601-01","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/201601-01"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"name":"[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2016/01/14/7"},{"name":"20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2016/Jan/44"},{"name":"SUSE-SU-2016:0119","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"},{"url":"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"},{"name":"SUSE-SU-2016:0118","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"},{"name":"FEDORA-2016-67c6ef0d4f","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"},{"name":"SUSE-SU-2016:0120","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"},{"name":"USN-2869-1","tags":["vendor-advisory"],"url":"http://www.ubuntu.com/usn/USN-2869-1"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"name":"DSA-3446","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2016/dsa-3446"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2016-01-14T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T22:30:04.441Z"},"title":"CVE Program Container","references":[{"url":"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/","tags":["x_transferred"]},{"name":"SUSE-SU-2016:0117","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"},{"url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/","tags":["x_transferred"]},{"name":"APPLE-SA-2016-03-21-5","tags":["vendor-advisory","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375","tags":["x_transferred"]},{"name":"20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778","tags":["mailing-list","x_transferred"],"url":"http://www.securityfocus.com/archive/1/537295/100/0/threaded"},{"url":"https://support.apple.com/HT206167","tags":["x_transferred"]},{"name":"FEDORA-2016-4556904561","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734","tags":["x_transferred"]},{"name":"80695","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/80695"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680","tags":["x_transferred"]},{"name":"FreeBSD-SA-16:07","tags":["vendor-advisory","x_transferred"],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:07.openssh.asc"},{"name":"FEDORA-2016-c330264861","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","tags":["x_transferred"]},{"url":"http://www.openssh.com/txt/release-7.1p2","tags":["x_transferred"]},{"name":"openSUSE-SU-2016:0128","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"},{"name":"FEDORA-2016-2e89eba0c1","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"},{"url":"https://bto.bluecoat.com/security-advisory/sa109","tags":["x_transferred"]},{"name":"1034671","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1034671"},{"name":"openSUSE-SU-2016:0127","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"},{"name":"GLSA-201601-01","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/201601-01"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","tags":["x_transferred"]},{"name":"[oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/01/14/7"},{"name":"20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2016/Jan/44"},{"name":"SUSE-SU-2016:0119","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"},{"url":"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html","tags":["x_transferred"]},{"name":"SUSE-SU-2016:0118","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"},{"name":"FEDORA-2016-67c6ef0d4f","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175592.html"},{"name":"SUSE-SU-2016:0120","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"},{"name":"USN-2869-1","tags":["vendor-advisory","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2869-1"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","tags":["x_transferred"]},{"name":"DSA-3446","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2016/dsa-3446"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","tags":["x_transferred"]}]}]}}