CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2016-7406 Dropbear SSH Multiple Security Vulnerabilities

2017年5月24日 2345点热度 0人点赞 0条评论

漏洞类别:General remote services

漏洞等级:

漏洞信息

Dropbear is a software package that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard OpenSSH for environments with low memory and processor resources, such as embedded systems.

Dropbear SSH contains the following vulnerabilites:
CVE-2016-7406: Format string vulnerability in Dropbear SSH allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
CVE-2016-7407: The dropbearconvert command in Dropbear SSH allows attackers to execute arbitrary code via a crafted OpenSSH key file.
CVE-2016-7408: dbclient could run arbitrary code as the local dbclient user if particular -m or -c arguments are provided. This could be an issue where dbclient is used in scripts. Successfully exploiting this issue will allow the attacker to execute arbitrary code within the context of an application using the affected library.
CVE-2016-7409: The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident. Dropbear SSH is prone to a remote information disclosure vulnerability. Successfully exploiting this issue will allow the attacker to gain sensitive information.

Affected Versions:
Dropbear SSH prior to 2016.74

QID Detection Logic (Authenticated):
This authenticated detection matches vulnerable versions of the Dropbear SSH client by running the "dripbear -V" command.
QID Detection Logic (Unauthenticated):
This unauthenticated detection matches vulnerable versions of Dropbear SSH based on the banner disclosed by the remote service.

漏洞危害

Depending on the vulnerability being exploited, an unauthenticated remote attacker could execute arbitrary code, gain sensitive information or cause a denial-of-service condition on a targeted server.

解决方案

Customers are advised to upgrade to Dropbear SSH 2016.74 or later versions to remediate these vulnerabilities.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

Dropbear SSH 2016.74 or later

0daybank

标签: 暂无
最后更新:2017年5月24日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me