CVE-2016-10708 — NULL Pointer Dereference in Openssh
Severity
7.5HIGHNVD
EPSS
3.1%
top 13.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 21
Latest updateMay 13
Description
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 14.04, 16.04, 18.04
Patches
🔴Vulnerability Details
5📋Vendor Advisories
4Palo Alto▶
PAN-SA-2020-0004 Informational: Third-party or open source vulnerabilities that do not affect PAN-OS↗2020-05-13
Red Hat▶
openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service↗2018-01-24
Debian▶
CVE-2016-10708: openssh - sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service ...↗2016
💬Community
1Bugzilla▶
CVE-2016-10708 openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service↗2018-01-24