Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-3116CRLF Injection in Dropbear

8 documents6 sources
Severity
6.4MEDIUMNVD
EPSS
27.6%
top 3.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 22
Latest updateMay 17

Description

CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 3.1 | Impact: 2.7

Affected Packages3 packages

debiandebian/dropbear< dropbear 2016.72-1 (bookworm)
Debiandropbear_ssh_project/dropbear_ssh< 2016.72-1+3

🔴Vulnerability Details

2
GHSA
GHSA-qrcr-w7v9-jxvw: CRLF injection vulnerability in Dropbear SSH before 20162022-05-17
OSV
CVE-2016-3116: CRLF injection vulnerability in Dropbear SSH before 20162016-03-22

💥Exploits & PoCs

1
Exploit-DB
DropBearSSHD 2015.71 - Command Injection2016-03-03

📋Vendor Advisories

1
Debian
CVE-2016-3116: dropbear - CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authen...2016

💬Community

3
Bugzilla
CVE-2016-3116 dropbear: X11 forwarding input not validated properly [fedora-all]2016-03-11
Bugzilla
CVE-2016-3116 dropbear: X11 forwarding input not validated properly2016-03-11
Bugzilla
CVE-2016-3116 dropbear: X11 forwarding input not validated properly [epel-all]2016-03-11