SB2016012018 - Fedora 23 update for gsi-openssh



SB2016012018 - Fedora 23 update for gsi-openssh

Published: January 20, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016012018
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 33% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2016-0777)

The vulnerability allows a remote user to disclose potentially sensitive information on the target system.
The weakness exists due to access control flaw that allows a malicious user to disclose important data.
Successful exploitation of the vulnerability leads to potentially sensitive information disclosure.

2) Denial of service (CVE-ID: CVE-2016-0778)

The vulnerability allows a remote user to cause denial of service conditions on the target system.
The weakness is due to insufficient access control that allows attackers to cause the service deny.
Successful exploitation of the vulnerability leads to denial of service on the vulnerable system.

3) Buffer overflow (CVE-ID: CVE-2016-1907)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.


Remediation

Install update from vendor's website.