CVE-2016-7409Sensitive Information Exposure in Dropbear

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 69.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMay 17

Description

The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/dropbear< dropbear 2016.74-1 (bookworm)
Debiandropbear_ssh_project/dropbear_ssh< 2016.74-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vqwq-p49h-3hx4: The dbclient and server in Dropbear SSH before 20162022-05-17
OSV
CVE-2016-7409: The dbclient and server in Dropbear SSH before 20162017-03-03

📋Vendor Advisories

1
Debian
CVE-2016-7409: dropbear - The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG...2016

💬Community

1
Bugzilla
CVE-2016-7406 CVE-2016-7407 CVE-2016-7408 CVE-2016-7409 dropbear: Multiple issues fixed in dropbear 2016.742016-09-15