OpenSSH Command Injection Vulnerability (CVE-2016-3115) <= 7.2p1 xauth)
OpenSSH Command Injection Vulnerability (CVE-2016-3115) <= 7.2p1 xauth)
Release date:
Updated on:
Affected Systems:
OpenSSH OpenSSH 〈 7.1p2
Description:
CVE (CAN) ID: CVE-2016-3115
OpenSSH is an open-source implementation of the SSH protocol.
OpenSSH <= 7.2p1 has the xauth command injection vulnerability, which can bypass forced-command and/bin/false.
<* Source: tintinweb
*>
Suggestion:
For more information about OpenSSH, see the following links:
Install and configure OpenSSH in Ubuntu Server 13.10
Install OpenSSH remotely on Ubuntu
Solve the latency problem during remote login through OpenSSH
Offline installation of OpenSSH in Ubuntu 12.10
OpenSSH upgrade steps and precautions
Solutions for failures of common OpenSSH users
General thread: OpenSSH key management, Part 1 Understanding RSA/DSA authentication
Install OpenSSH and configure the sftp lock directory for RedHat
Vendor patch:
OpenSSH
-------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
[1] http://www.openssh.com/
[2] https://github.com/openssh/openssh-portable/blob/5a0fcb77287342e2fc2ba1cee79b6af108973dc2/session.c#L1388
[3] https://github.com/openssh/openssh-portable/blob/19bcf2ea2d17413f2d9730dd2a19575ff86b9b6a/clientloop.c#L376
[4] http://linux.die.net/man/1/xauth
[5] http://www.openssh.com/txt/x11fwd.adv
This article permanently updates the link address: