CVE-2016-3116

MEDIUM

Dropbear SSH <2016.72 - Auth Bypass

Title source: llm
STIX 2.1

Description

CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.

Exploits (2)

exploitdb WORKING POC
by tintinweb · remotelinux
https://www.exploit-db.com/exploits/40119
nomisec WORKING POC 2 stars
by mxypoo · poc
https://github.com/mxypoo/CVE-2016-3116-DropbearSSH

References (10)

Core 10
Core References
Various Sources x_refsource_confirm
https://matt.ucc.asn.au/dropbear/CHANGES
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179269.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179261.html
Mailing List mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2016/Mar/47
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179870.html
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-03/msg00113.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201607-08
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-03/msg00105.html

Scores

CVSS v3 6.4
EPSS 0.2758
EPSS Percentile 96.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Details

Status published
Products (1)
dropbear_ssh_project/dropbear_ssh < 2015.71
Published Mar 22, 2016
Tracked Since Feb 18, 2026