The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201702-23 | vdb entry third party advisory patch vendor advisory |
https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04 | issue tracking third party advisory patch |
http://www.openwall.com/lists/oss-security/2016/09/15/2 | mailing list third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1376353 | issue tracking |
http://www.securityfocus.com/bid/92973 | vdb entry third party advisory |