Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2016-10012: ELSA-2017-2029: openssh security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2016-10012: ELSA-2017-2029: openssh security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Severity
4
CVSS
(AV:N/AC:H/Au:S/C:P/I:P/A:N)
Published
12/19/2016
Created
07/25/2018
Added
08/08/2017
Modified
11/29/2024

Description

The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures. It was found that the boundary checks in the code implementing support for pre-authentication compression could have been optimized out by certain compilers. An attacker able to compromise the privilege-separated process could possibly use this flaw for further attacks against the privileged monitor process.

Solution(s)

  • oracle-linux-upgrade-openssh
  • oracle-linux-upgrade-openssh-askpass
  • oracle-linux-upgrade-openssh-cavs
  • oracle-linux-upgrade-openssh-clients
  • oracle-linux-upgrade-openssh-keycat
  • oracle-linux-upgrade-openssh-ldap
  • oracle-linux-upgrade-openssh-server
  • oracle-linux-upgrade-openssh-server-sysvinit
  • oracle-linux-upgrade-pam-ssh-agent-auth

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;