SB2016032204 - Remote command execution in Dropbear SSH
Published: March 22, 2016 Updated: August 5, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) CRLF injection (CVE-ID: CVE-2016-3116)
The vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to improper input validation when processing CRLF characters. A remote authenticated user bypass intended shell-command restrictions via crafted X11 forwarding data.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179261.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179269.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179870.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00105.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00113.html
- http://packetstormsecurity.com/files/136251/Dropbear-SSHD-xauth-Command-Injection-Bypass.html
- http://seclists.org/fulldisclosure/2016/Mar/47
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115
- https://matt.ucc.asn.au/dropbear/CHANGES
- https://security.gentoo.org/glsa/201607-08