CVE-2016-0778 (CNNVD-201601-250)
中文标题:
OpenSSH 拒绝服务漏洞
英文标题:
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5....
漏洞描述
中文描述:
OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组所维护的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH的客户端中的roaming_common.c文件中的‘roaming_read’和‘roaming_write’函数中存在安全漏洞,该漏洞源于程序启用特定的代理和转发选项时,没有正确保持连接文件描述符。远程攻击者可通过发送多个转发请求利用该漏洞造成拒绝服务(基于堆的缓冲区溢出)。以下版本受到影响:OpenSSH 5.x版本,6.x版本,7.1p2之前7.x版本。
英文描述:
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| oracle | linux | 7 | - | - |
cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
|
| oracle | solaris | 11.3 | - | - |
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
|
| openbsd | openssh | 5.4 | - | - |
cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*
|
| openbsd | openssh | 5.5 | - | - |
cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*
|
| openbsd | openssh | 5.6 | - | - |
cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*
|
| openbsd | openssh | 5.7 | - | - |
cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*
|
| openbsd | openssh | 5.8 | - | - |
cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*
|
| openbsd | openssh | 5.9 | - | - |
cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.0 | - | - |
cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.1 | - | - |
cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.2 | - | - |
cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.3 | - | - |
cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.4 | - | - |
cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.5 | - | - |
cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.6 | - | - |
cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.7 | - | - |
cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.8 | - | - |
cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*
|
| openbsd | openssh | 6.9 | - | - |
cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*
|
| openbsd | openssh | 7.0 | - | - |
cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*
|
| openbsd | openssh | 7.1 | - | - |
cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| hp | virtual_customer_access_system | * | - | - |
cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*
|
| sophos | unified_threat_management_software | 9.353 | - | - |
cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-0778 |
2025-11-11 15:19:03 | 2025-11-11 07:34:12 |
| NVD | nvd_CVE-2016-0778 |
2025-11-11 14:55:05 | 2025-11-11 07:42:53 |
| CNNVD | cnnvd_CNNVD-201601-250 |
2025-11-11 15:09:38 | 2025-11-11 07:52:21 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-201601-250
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 8.1
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 23
- data_sources: ['cve'] -> ['cve', 'nvd']