CVE-2016-10708NULL Pointer Dereference in Openssh

Severity
7.5HIGHNVD
EPSS
3.1%
top 13.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 21
Latest updateMay 13

Description

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDopenbsd/openssh< 7.4
Debianopenbsd/openssh< 1:7.4p1-1+3
Ubuntuopenbsd/openssh< 1:6.6p1-2ubuntu2.11+3
Palo Altopaloalto/pan-os

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 14.04, 16.04, 18.04

Patches

🔴Vulnerability Details

5
GHSA
GHSA-fq52-jg4q-73hp: sshd in OpenSSH before 72022-05-13
OSV
openssh regression2021-08-12
OSV
openssh vulnerabilities2018-11-06
OSV
CVE-2016-10708: sshd in OpenSSH before 72018-01-21
CVEList
CVE-2016-10708: sshd in OpenSSH before 72018-01-21

📋Vendor Advisories

4
Palo Alto
PAN-SA-2020-0004 Informational: Third-party or open source vulnerabilities that do not affect PAN-OS2020-05-13
Ubuntu
OpenSSH vulnerabilities2018-11-06
Red Hat
openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service2018-01-24
Debian
CVE-2016-10708: openssh - sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service ...2016

💬Community

1
Bugzilla
CVE-2016-10708 openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service2018-01-24
CVE-2016-10708 — NULL Pointer Dereference in Openssh | cvebase