Vulnerability Details CVE-2016-7409
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.3%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 2.1
Products affected by CVE-2016-7409
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.28
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.29
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.30
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.31
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.32
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.33
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.34
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.35
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.36
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.37
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.38
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.39
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.40
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.41
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.42
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.43
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.44
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.45
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.46
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.47
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.48
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.48.1
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.49
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.50
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.51
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.52
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.53
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.53.1
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2011.54
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2012.54
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2012.55
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.56
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.57
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.58
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.59
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.60
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.61
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.62
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.63
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.64
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.65
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.66
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.67
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.68
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.69
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.70
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.71
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2016.72
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2016.73