Your submission was sent successfully! Close

CVE-2016-10012

Published: 4 January 2017

The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
openssh
Launchpad, Ubuntu, Debian
artful Not vulnerable
(1:7.4p1-1)
bionic Not vulnerable
(1:7.4p1-1)
cosmic Not vulnerable
(1:7.4p1-1)
disco Not vulnerable
(1:7.4p1-1)
eoan Not vulnerable
(1:7.4p1-1)
focal Not vulnerable
(1:7.4p1-1)
groovy Not vulnerable
(1:7.4p1-1)
hirsute Not vulnerable
(1:7.4p1-1)
precise Ignored
(end of ESM support, was needed)
trusty
Released (1:6.6p1-2ubuntu2.10)
upstream
Released (1:7.4p1-1)
xenial
Released (1:7.2p2-4ubuntu2.4)
yakkety Ignored
(reached end-of-life)
zesty Not vulnerable
(1:7.4p1-1)

Notes

AuthorNote
ratliff
Mitigating circumstances noted in the release notes:
This could potentially allow attacks against the
privileged monitor process from the sandboxed privilege-separation
process (a compromise of the latter would be required first).
also "pre-auth compression has been disabled by default in
sshd for >10 years."

References

Bugs