Upstream information

CVE-2016-3116 at MITRE

Description

CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.46
Vector AV:N/AC:L/Au:S/C:P/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database
Base Score 6.4
Vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Access Vector Network
Access Complexity Low
Privileges Required Low
User Interaction None
Scope Changed
Confidentiality Impact Low
Integrity Impact Low
Availability Impact None
SUSE Bugzilla entry: 970633 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 13.1
  • dropbear >= 2016.72-2.7.1
  • dropbear-debuginfo >= 2016.72-2.7.1
  • dropbear-debugsource >= 2016.72-2.7.1
Patchnames:
openSUSE-2016-393
openSUSE 13.2
  • dropbear >= 2016.72-2.3.1
  • dropbear-debuginfo >= 2016.72-2.3.1
  • dropbear-debugsource >= 2016.72-2.3.1
Patchnames:
openSUSE-2016-387
openSUSE Leap 42.1
  • dropbear >= 2016.72-8.1
  • dropbear-debuginfo >= 2016.72-8.1
  • dropbear-debugsource >= 2016.72-8.1
Patchnames:
openSUSE-2016-387