Public Date:
1298033: CVE-2016-0778 OpenSSH: Client buffer-overflow when using roaming connections
A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options.

Find out more about CVE-2016-0778 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (openssh) RHSA-2016:0043 2016-01-14

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 openssh Not affected
Red Hat Enterprise Linux 5 openssh Not affected
Red Hat Enterprise Linux 4 openssh Not affected


Red Hat would like to thank Qualys for reporting this issue.

External References

Last Modified