Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2016-10010 - High Severity Vulnerability
Vulnerable Library - src0aecda14650f9fce8577e43d2a403385b5fa5bcf
Public git conversion mirror of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.
Library home page: https://github.com/openbsd/src.git
Vulnerable Source Files (2)
/usr.bin/ssh/serverloop.c /usr.bin/ssh/serverloop.c
Vulnerability Details
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
Publish Date: 2017-01-05
URL: CVE-2016-10010
CVSS 3 Score Details (7.0)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-10010
Release Date: 2017-01-05
Fix Resolution: openssh - 7.4p1-1