The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
History
                    21 Nov 2024, 02:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734 - Third Party Advisory | |
| References | () http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html - Mailing List, Release Notes, Third Party Advisory | |
| References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html - Mailing List, Third Party Advisory | |
| References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html - Mailing List, Third Party Advisory | |
| References | () http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html - Third Party Advisory, VDB Entry | |
| References | () http://seclists.org/fulldisclosure/2016/Jan/44 - Mailing List, Third Party Advisory | |
| References | () http://www.debian.org/security/2016/dsa-3446 - Third Party Advisory | |
| References | () http://www.openssh.com/txt/release-7.1p2 - Patch, Release Notes, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2016/01/14/7 - Exploit, Mailing List, Technical Description, Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
| References | () http://www.securityfocus.com/archive/1/537295/100/0/threaded - Third Party Advisory, VDB Entry | |
| References | () http://www.securityfocus.com/bid/80698 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1034671 - Third Party Advisory, VDB Entry | |
| References | () http://www.ubuntu.com/usn/USN-2869-1 - Third Party Advisory | |
| References | () https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ - Release Notes, Vendor Advisory | |
| References | () https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ - Release Notes, Vendor Advisory | |
| References | () https://bto.bluecoat.com/security-advisory/sa109 - Third Party Advisory | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - | |
| References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 - Third Party Advisory | |
| References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - Third Party Advisory | |
| References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - Third Party Advisory | |
| References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/201601-01 - Third Party Advisory | |
| References | () https://support.apple.com/HT206167 - Vendor Advisory | 
Information
                Published : 2016-01-14 22:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-0778
Mitre link : CVE-2016-0778
CVE.ORG link : CVE-2016-0778
JSON object : View
Products Affected
                openbsd
- openssh
oracle
- solaris
- linux
apple
- mac_os_x
hp
- virtual_customer_access_system
sophos
- unified_threat_management_software
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
