CVE-2016-10011
openssh: Leak of host private key material to privilege-separated child process via realloc()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
authfile.c en sshd en OpenSSH en versiones anteriores a 7.4 no considera apropiadamente los efectos de realloc en el contenido de búfer, lo que podría permitir a usuarios locales obtener información sensible de clave privada aprovechando el acceso a un subproceso separado de privilegios.
It was found that the host private key material could possibly leak to the privilege-separated child processes via re-allocated memory. An attacker able to compromise the privilege-separated process could therefore obtain the leaked key information.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-12-19 CVE Reserved
- 2016-12-25 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-320: Key Management Errors
CAPEC
References (14)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | 2022-12-13 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:2029 | 2022-12-13 | |
https://access.redhat.com/security/cve/CVE-2016-10011 | 2017-08-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1406286 | 2017-08-01 |