Files
CVEs-PoC/2016/CVE-2016-10012.md
T
2025-09-29 21:09:30 +02:00

35 lines
1.6 KiB
Markdown

### [CVE-2016-10012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
### POC
#### Reference
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HackDreamer/Network-Vulnerability-Scanner
- https://github.com/Jimi421/NakulaScan-2.0
- https://github.com/Maribel0370/Nebula-io
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Prakanth20/Network-Scanner-with-Banner-Grabbing-and-CVE-Detection
- https://github.com/bigb0x/CVE-2024-6387
- https://github.com/bigb0x/OpenSSH-Scanner
- https://github.com/bioly230/THM_Skynet
- https://github.com/edsonjt81/https-github.com-gotr00t0day-OpenSSH-Scanner
- https://github.com/kmukoo101/CVEye
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/phx/cvescan
- https://github.com/retr0-13/cveScannerV2
- https://github.com/ryanalieh/openSSH-scanner
- https://github.com/scmanjarrez/CVEScannerV2
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough