ALT-PU-2016-2184-1
Closed vulnerabilities
BDU:2016-00819
Уязвимости средства криптографической защиты OpenSSH, позволяющие нарушителю обойти ограничения интерпретатора команд
BDU:2016-02237
Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2016-02352
Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-07416
Уязвимость функции do_setup_env (session.c) службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии
Modified: 2025-04-12
CVE-2015-8325
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
- http://rhn.redhat.com/errata/RHSA-2016-2588.html
- http://rhn.redhat.com/errata/RHSA-2017-0641.html
- http://www.debian.org/security/2016/dsa-3550
- http://www.securityfocus.com/bid/86187
- http://www.securitytracker.com/id/1036487
- https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
- https://bugzilla.redhat.com/show_bug.cgi?id=1328012
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
- https://security-tracker.debian.org/tracker/CVE-2015-8325
- https://security.gentoo.org/glsa/201612-18
- https://security.netapp.com/advisory/ntap-20180628-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2588.html
- http://rhn.redhat.com/errata/RHSA-2017-0641.html
- http://www.debian.org/security/2016/dsa-3550
- http://www.securityfocus.com/bid/86187
- http://www.securitytracker.com/id/1036487
- https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
- https://bugzilla.redhat.com/show_bug.cgi?id=1328012
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
- https://security-tracker.debian.org/tracker/CVE-2015-8325
- https://security.gentoo.org/glsa/201612-18
- https://security.netapp.com/advisory/ntap-20180628-0001/
Modified: 2025-04-12
CVE-2016-3115
Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183101.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183122.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178838.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179924.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180491.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184264.html
- http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html
- http://rhn.redhat.com/errata/RHSA-2016-0465.html
- http://rhn.redhat.com/errata/RHSA-2016-0466.html
- http://seclists.org/fulldisclosure/2016/Mar/46
- http://seclists.org/fulldisclosure/2016/Mar/47
- http://www.openssh.com/txt/x11fwd.adv
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/84314
- http://www.securitytracker.com/id/1035249
- https://bto.bluecoat.com/security-advisory/sa121
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115
- https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
- https://security.gentoo.org/glsa/201612-18
- https://www.exploit-db.com/exploits/39569/
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:14.openssh.asc
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183101.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183122.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178838.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179924.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180491.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184264.html
- http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html
- http://rhn.redhat.com/errata/RHSA-2016-0465.html
- http://rhn.redhat.com/errata/RHSA-2016-0466.html
- http://seclists.org/fulldisclosure/2016/Mar/46
- http://seclists.org/fulldisclosure/2016/Mar/47
- http://www.openssh.com/txt/x11fwd.adv
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/84314
- http://www.securitytracker.com/id/1035249
- https://bto.bluecoat.com/security-advisory/sa121
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115
- https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
- https://security.gentoo.org/glsa/201612-18
- https://www.exploit-db.com/exploits/39569/
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:14.openssh.asc
Modified: 2025-04-20
CVE-2016-6210
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
- http://seclists.org/fulldisclosure/2016/Jul/51
- http://www.debian.org/security/2016/dsa-3626
- http://www.securityfocus.com/bid/91812
- http://www.securitytracker.com/id/1036319
- https://access.redhat.com/errata/RHSA-2017:2029
- https://access.redhat.com/errata/RHSA-2017:2563
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://security.gentoo.org/glsa/201612-18
- https://security.netapp.com/advisory/ntap-20190206-0001/
- https://www.exploit-db.com/exploits/40113/
- https://www.exploit-db.com/exploits/40136/
- https://www.openssh.com/txt/release-7.3
- http://seclists.org/fulldisclosure/2016/Jul/51
- http://www.debian.org/security/2016/dsa-3626
- http://www.securityfocus.com/bid/91812
- http://www.securitytracker.com/id/1036319
- https://access.redhat.com/errata/RHSA-2017:2029
- https://access.redhat.com/errata/RHSA-2017:2563
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://security.gentoo.org/glsa/201612-18
- https://security.netapp.com/advisory/ntap-20190206-0001/
- https://www.exploit-db.com/exploits/40113/
- https://www.exploit-db.com/exploits/40136/
- https://www.openssh.com/txt/release-7.3
Modified: 2025-04-12
CVE-2016-8858
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
- http://www.openwall.com/lists/oss-security/2016/10/19/3
- http://www.openwall.com/lists/oss-security/2016/10/20/1
- http://www.securityfocus.com/bid/93776
- http://www.securitytracker.com/id/1037057
- https://bugzilla.redhat.com/show_bug.cgi?id=1384860
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig
- https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:33.openssh.asc
- https://security.gentoo.org/glsa/201612-18
- https://security.netapp.com/advisory/ntap-20180201-0001/
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
- http://www.openwall.com/lists/oss-security/2016/10/19/3
- http://www.openwall.com/lists/oss-security/2016/10/20/1
- http://www.securityfocus.com/bid/93776
- http://www.securitytracker.com/id/1037057
- https://bugzilla.redhat.com/show_bug.cgi?id=1384860
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig
- https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:33.openssh.asc
- https://security.gentoo.org/glsa/201612-18
- https://security.netapp.com/advisory/ntap-20180201-0001/