CVE-2016-1907Improper Restriction of Operations within the Bounds of a Memory Buffer in Openssh

Severity
5.3MEDIUMNVD
OSV7.8
EPSS
0.5%
top 35.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 19
Latest updateMay 17

Description

The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

Debianopenbsd/openssh< 1:7.1p2-1+3
Ubuntuopenbsd/openssh< 1:6.6p1-2ubuntu2.7
NVDopenbsd/openssh4 versions+3

🔴Vulnerability Details

4
GHSA
GHSA-3xwc-hv27-5fhw: The ssh_packet_read_poll2 function in packet2022-05-17
OSV
openssh vulnerabilities2016-05-09
OSV
CVE-2016-1907: The ssh_packet_read_poll2 function in packet2016-01-19
CVEList
CVE-2016-1907: The ssh_packet_read_poll2 function in packet2016-01-19

📋Vendor Advisories

3
Ubuntu
OpenSSH vulnerabilities2016-05-09
Red Hat
openssh: out-of-bounds read in packet handling code2016-01-14
Debian
CVE-2016-1907: openssh - The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows re...2016

💬Community

1
Bugzilla
CVE-2016-1907 openssh: out-of-bounds read in packet handling code2016-01-14
CVE-2016-1907 — Openbsd Openssh vulnerability | cvebase