The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

security announce CVE-2016-0777 CVE-2016-0778

OpenSSH: key disclosure via Roaming

Synthesis of the vulnerability

An attacker, who owns a malicious SSH server, can invite a client to connect with OpenSSH, and then call the Roaming feature, in order to obtain sensitive information about keys used by the SSH client.
Severity of this bulletin: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 14/01/2016.
Revision date: 14/01/2016.
Références of this threat: 046062, 7043086, 9010059, BSA-2016-002, bulletinoct2015, CERTFR-2016-AVI-022, CERTFR-2016-AVI-128, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, CVE-2016-0777, CVE-2016-0778, DSA-3446-1, FEDORA-2016-2e89eba0c1, FEDORA-2016-4556904561, FEDORA-2016-67c6ef0d4f, FEDORA-2016-c330264861, FreeBSD-SA-16:07.openssh, JSA10734, JSA10774, NTAP-20160126-0001, openSUSE-SU-2016:0127-1, openSUSE-SU-2016:0128-1, openSUSE-SU-2016:0144-1, openSUSE-SU-2016:0145-1, PAN-SA-2016-0011, RHSA-2016:0043-01, SSA:2016-014-01, SUSE-SU-2016:0117-1, SUSE-SU-2016:0118-1, SUSE-SU-2016:0119-1, SUSE-SU-2016:0120-1, USN-2869-1, VIGILANCE-VUL-18729, VN-2016-001, VU#456088.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The OpenSSH product implements a SSH client and server.

The SSH client contains an undocumented experimental feature named Roaming, which is implemented in the roaming_client.c file. This feature is enabled by default, and it is used to restart an old session. It is impacted by two vulnerabilities.

The Roaming feature can be used by a SSH server to read the SSH client memory, to obtain its keys. [severity:3/4; CVE-2016-0777]

The Roaming feature can be used by a SSH server to trigger an overflow and a descriptor leak in the SSH client, in order to generate a denial of service. [severity:2/4; CVE-2016-0778]

An attacker, who owns a malicious SSH server, can therefore invite a client to connect with OpenSSH, and then call the Roaming feature, in order to obtain sensitive information about keys used by the SSH client.
Full Vigil@nce bulletin... (Free trial)

This threat impacts software or systems such as DCFM Enterprise, FabricOS, Brocade Network Advisor, Brocade vTM, Debian, Black Diamond, ExtremeXOS, Summit, Fedora, FreeBSD, AIX, WebSphere MQ, Juniper J-Series, Junos OS, NSM Central Manager, NSMXpress, Meinberg NTP Server, Data ONTAP 7-Mode, OpenBSD, OpenSSH, openSUSE, openSUSE Leap, Solaris, Palo Alto Firewall PA***, PAN-OS, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Symfony, Synology DS***, Synology RS***, Ubuntu.

Our Vigil@nce team determined that the severity of this computer threat is important.

The trust level is of type confirmed by the editor, with an origin of internet server.

This bulletin is about 2 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this cybersecurity bulletin.

Solutions for this threat

OpenSSH Portable: version 7.1p2.
The version 7.1p2 is fixed:
  http://www.openssh.com/

OpenSSH: workaround for Roaming.
A workaround is to disable Roaming:
 - add in the file /etc/ssh/ssh_config, the option "UseRoaming no"
 - in each call of the ssh client, add on the command line "-oUseRoaming=no"
It is recommended to generate new keys for the SSH client user.

OpenBSD: patch for OpenSSH Roaming.
A patch is indicated in information sources.

Brocade: solution.
The solution is indicated in information sources.

Copssh: version 5.5.0.
The version 5.5.0 is fixed:
  https://www.itefix.net/copssh

Debian: new openssh packages.
New packages are available:
  Debian 7: openssh 1:6.0p1-4+deb7u3
  Debian 8: openssh 1:6.7p1-5+deb8u1

Extreme Networks ExtremeXOS: solution for OpenSSH.
The solution is indicated in information sources.

Fedora: new gsi-openssh packages.
New packages are available:
  Fedora 23: gsi-openssh 7.1p2-1.fc23
  Fedora 22: gsi-openssh 6.9p1-7.fc22

Fedora: new openssh packages.
New packages are available:
  Fedora 22: openssh 6.9p1-10.fc22
  Fedora 23: openssh 7.1p2-1.fc23

FreeBSD: patch for OpenSSH.
A patch is available:
  https://security.FreeBSD.org/patches/SA-16:07/openssh.patch

IBM AIX: patch for OpenSSH.
A patch is available:
  https://aix.software.ibm.com/aix/efixes/security/openssh_fix7.tar

IBM WebSphere MQ: version 8.0.0.5.
The version 8.0.0.5 is fixed.

ITeFix Copssh: version 5.4.2.
The version 5.4.2 is fixed:
  https://www.itefix.net/copssh

Juniper NSM Appliance: patch for Upgrade Package v3.
A patch is available:
  http://www.juniper.net/support/downloads/?p=nsm#sw

Junos: fixed versions for OpenSSH.
Fixed versions are indicated in information sources.

Meinberg NTP Server: solution.
The solution is indicated in information sources.

NetApp Data ONTAP: solution for OpenSSH 01/2016.
The solution is indicated in information sources:
  Data ONTAP Edge: http://mysupport.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=981366
  Data ONTAP operating in 7-Mode: http://mysupport.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=981367

openSUSE: new openssh packages.
New packages are available:
  openSUSE 11.4: openssh 5.8p1-11.1
  openSUSE 13.1: openssh 6.2p2-3.7.1
  openSUSE 13.2: openssh 6.6p1-5.3.1
  openSUSE Leap 42.1: openssh 6.6p1-8.1

PAN-OS: version 7.1.3.
The version 7.1.3 is fixed:
  https://www.paloaltonetworks.com/

RHEL 7: new openssh packages.
New packages are available:
  RHEL 7: openssh 6.6.1p1-23.el7_2

Slackware: new openssh packages.
New packages are available (read carrefully the announce):
  Slackware 13.0: openssh 7.1p2-*-1_slack13.0
  Slackware 13.1: openssh 7.1p2-*-1_slack13.1
  Slackware 13.37: openssh 7.1p2-*-1_slack13.37
  Slackware 14.0: openssh 7.1p2-*-1_slack14.0
  Slackware 14.1: openssh 7.1p2-*-1_slack14.1

Solaris: patch for OpenSSH.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

SUSE LE: new openssh packages.
New packages are available:
  SUSE LE 11 SP3: openssh 6.2p2-0.24.1
  SUSE LE 11 SP4: openssh 6.6p1-16.1
  SUSE LE 12 RTM: openssh 6.6p1-33.1
  SUSE LE 12 SP1: openssh 6.6p1-33.1

Symfony: version 2.8.2.
The version 2.8.2 is fixed:
  http://symfony.com/download

Synology DS, RS: version 5.2-5644 Update 3.
The version 5.2-5644 Update 3 is fixed:
  https://www.synology.com

Ubuntu: new openssh-client packages.
New packages are available:
  Ubuntu 15.10: openssh-client 1:6.9p1-2ubuntu0.1
  Ubuntu 15.04: openssh-client 1:6.7p1-5ubuntu1.4
  Ubuntu 14.04 LTS: openssh-client 1:6.6p1-2ubuntu2.4
  Ubuntu 12.04 LTS: openssh-client 1:5.9p1-5ubuntu1.8

Wind River Linux: solution for OpenSSH.
The solution is indicated in information sources.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides cybersecurity analysis. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system.