mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-15 07:40:25 +02:00
72 lines
3.5 KiB
Markdown
72 lines
3.5 KiB
Markdown
### [CVE-2016-0777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
|
|
- http://seclists.org/fulldisclosure/2016/Jan/44
|
|
- http://www.openwall.com/lists/oss-security/2016/01/14/7
|
|
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
|
|
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
|
|
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
|
|
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
|
|
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
|
|
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
|
|
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/AgenticAI-LLM/Hackathon
|
|
- https://github.com/DevomB/SERP-DB
|
|
- https://github.com/ELHADANITAHA/OWASP-JSP-TP
|
|
- https://github.com/Jimi421/NakulaScan-2.0
|
|
- https://github.com/JustinZ/sshd
|
|
- https://github.com/Nihar2520/Cybersecurity-trainee-assignment-
|
|
- https://github.com/Paulineclv/Port-Scanner
|
|
- https://github.com/PsychoH4x0r/Unknown1337-Auto-Root-
|
|
- https://github.com/RajathHolla/puppet-ssh
|
|
- https://github.com/RedHatSatellite/satellite-host-cve
|
|
- https://github.com/WinstonN/fabric2
|
|
- https://github.com/akshayprasad/Linux_command_crash_course
|
|
- https://github.com/bigb0x/CVE-2024-6387
|
|
- https://github.com/bigb0x/OpenSSH-Scanner
|
|
- https://github.com/chuongvuvan/awesome-ssh
|
|
- https://github.com/cpcloudnl/ssh-config
|
|
- https://github.com/dblume/dotfiles
|
|
- https://github.com/devopstest6022/puppet-ssh
|
|
- https://github.com/dyuri/repassh
|
|
- https://github.com/edsonjt81/https-github.com-gotr00t0day-OpenSSH-Scanner
|
|
- https://github.com/eric-erki/awesome-ssh
|
|
- https://github.com/ghoneycutt/puppet-module-ssh
|
|
- https://github.com/hackingyseguridad/ssha
|
|
- https://github.com/jaymoulin/docker-sshtron
|
|
- https://github.com/jcdad3000/GameServer
|
|
- https://github.com/jcdad3000/gameserverB
|
|
- https://github.com/kdairatchi/crackscanner
|
|
- https://github.com/lycaleynes/NMAP-and-Wireshark
|
|
- https://github.com/lycaleynes/Nmap
|
|
- https://github.com/marcospedreiro/sshtron
|
|
- https://github.com/megabyte-b/Project-Ares
|
|
- https://github.com/micaelarg/vulnerability_scanner_public
|
|
- https://github.com/moul/awesome-ssh
|
|
- https://github.com/nishanb/insecure-app
|
|
- https://github.com/phx/cvescan
|
|
- https://github.com/project7io/nmap
|
|
- https://github.com/ritheesh0/SOC-Incident-Response-Lab
|
|
- https://github.com/ryanalieh/openSSH-scanner
|
|
- https://github.com/threepistons/puppet-module-ssh
|
|
- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough
|
|
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
|
|
- https://github.com/xasyhack/oscp2025
|
|
- https://github.com/xasyhack/oscp_cheat_sheet_2025
|
|
- https://github.com/zachlatta/sshtron
|
|
|