Lucene search

K
seebugRootSSV:92579
HistoryDec 21, 2016 - 12:00 a.m.

OpenSSH remote code execution vulnerability, CVE-2016-10009)

2016-12-2100:00:00
Root
www.seebug.org
3817

0.102 Low

EPSS

Percentile

94.3%

2016 12 on 19 May, the foreign vulnerability of the platform to publish the latest OpenSSH(CVE-2016-10009 remote code execution vulnerability.Since the problem is in ssh-agent, this process by default does not start, only in a multi-host Free the password the login will only be used to exploit conditions are relatively harsh, therefore the official vulnerability rating is only“medium-risk”to. The user is still required as soon as possible to upgrade to the latest version.

OpenSSH 7.4 in 2016 12 December 19 officially released, the new version is ported in Linux, BSD, and other Unix-like platform on the SSH 2.0 Protocol full support, major fixes to the previous version found bugs and security issues. It should be noted that, the 7.4 version of the underlying changes that may affect existing configurations.

According to the cyberspace search engine ZoomEye results show that the current Internet can be detected OpenSSH device about 19,659,712 station, these devices or become a hacker to attack a potential target.