vulnerability

RHSA-2016:0465: openssh security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Mar 21, 2016
Added
Mar 22, 2016
Modified
Jul 28, 2025

Description

OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation.These packages include the core files necessary for both the OpenSSH clientand server.It was discovered that the OpenSSH server did not sanitize data receivedin requests to enable X11 forwarding. An authenticated client withrestricted SSH access could possibly use this flaw to bypass intendedrestrictions. (CVE-2016-3115)An access flaw was discovered in OpenSSH; the OpenSSH client did notcorrectly handle failures to generate authentication cookies for untrustedX11 forwarding. A malicious or compromised remote X application couldpossibly use this flaw to establish a trusted connection to the local Xserver, even if only untrusted X11 forwarding was requested.(CVE-2016-1908)All openssh users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing thisupdate, the OpenSSH server daemon (sshd) will be restarted automatically.

Solutions

redhat-upgrade-opensshredhat-upgrade-openssh-askpassredhat-upgrade-openssh-clientsredhat-upgrade-openssh-debuginforedhat-upgrade-openssh-keycatredhat-upgrade-openssh-ldapredhat-upgrade-openssh-serverredhat-upgrade-openssh-server-sysvinitredhat-upgrade-pam_ssh_agent_auth
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.