Information Exposure Affecting openssh-clients package, versions <0:7.4p1-11.el7


Severity

Recommended
0.0
medium
0
10

Based on Oracle Linux security rating.

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
90.05% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ORACLE7-OPENSSHCLIENTS-2517886
  • published10 Apr 2022
  • disclosed13 Feb 2017

Introduced: 13 Feb 2017

CVE-2016-6210  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Oracle:7 openssh-clients to version 0:7.4p1-11.el7 or higher.
This issue was patched in ELSA-2017-2029.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssh-clients package and not the openssh-clients package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.