<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778</title>
	<atom:link href="http://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 10 Apr 2026 21:14:09 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1470555</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Feb 2016 11:42:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1470555</guid>
		<description><![CDATA[Adjusting to OpenSSH client &quot;Roaming&quot; vulnerability &#124; Druid
http://druid.fi/en/blog/adjusting-to-openssh-client-roaming-vulnerability

I wonder if SSH agent forwarding exposes private keys to remote SSH client. After reading man ssh_config, it seems that only the agent interface is exposed, not the keys themselves.

In this post, I will summarize fixes for certain server environments.

The CVEs are CVE-2016-0777 and CVE-2016-0778.

Quick fix

The vulnerable code (for Roaming) can be disabled in SSH client settings:
Just drop

UseRoaming no

In the SSH client config file.]]></description>
		<content:encoded><![CDATA[<p>Adjusting to OpenSSH client &#8220;Roaming&#8221; vulnerability | Druid<br />
<a href="http://druid.fi/en/blog/adjusting-to-openssh-client-roaming-vulnerability" rel="nofollow">http://druid.fi/en/blog/adjusting-to-openssh-client-roaming-vulnerability</a></p>
<p>I wonder if SSH agent forwarding exposes private keys to remote SSH client. After reading man ssh_config, it seems that only the agent interface is exposed, not the keys themselves.</p>
<p>In this post, I will summarize fixes for certain server environments.</p>
<p>The CVEs are CVE-2016-0777 and CVE-2016-0778.</p>
<p>Quick fix</p>
<p>The vulnerable code (for Roaming) can be disabled in SSH client settings:<br />
Just drop</p>
<p>UseRoaming no</p>
<p>In the SSH client config file.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1470554</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Feb 2016 11:41:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1470554</guid>
		<description><![CDATA[USN-2869-1: OpenSSH vulnerabilities &#124; Ubuntu
http://www.epanorama.net/newepa/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/
http://www.ubuntu.com/usn/usn-2869-1/]]></description>
		<content:encoded><![CDATA[<p>USN-2869-1: OpenSSH vulnerabilities | Ubuntu<br />
<a href="http://www.epanorama.net/newepa/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/" rel="nofollow">http://www.epanorama.net/newepa/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/</a><br />
<a href="http://www.ubuntu.com/usn/usn-2869-1/" rel="nofollow">http://www.ubuntu.com/usn/usn-2869-1/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1467228</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 14:34:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1467228</guid>
		<description><![CDATA[OpenSSH: Information-leak vulnerability (CVE-2016-0777) 
https://access.redhat.com/articles/2123781]]></description>
		<content:encoded><![CDATA[<p>OpenSSH: Information-leak vulnerability (CVE-2016-0777)<br />
<a href="https://access.redhat.com/articles/2123781" rel="nofollow">https://access.redhat.com/articles/2123781</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1467145</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 10:15:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1467145</guid>
		<description><![CDATA[Bug that can leak crypto keys just fixed in widely used OpenSSH
Vulnerability allows malicious servers to read memory on connecting computers.
http://arstechnica.com/security/2016/01/bug-that-can-leak-crypto-keys-just-fixed-in-widely-used-openssh/

A critical bug that can leak secret cryptographic keys has just just been fixed in OpenSSH, one of the more widely used implementations of the secure shell (SSH) protocol.

The vulnerability resides only in the version end users use to connect to servers and not in versions used by servers. A maliciously configured server could exploit it to obtain the contents of the connecting computer&#039;s memory, including the private encryption key used for SSH connections. The bug is the result of code that enables an experimental roaming feature in OpenSSH versions 5.4 to 7.1

&quot;The matching server code has never been shipped, but the client code was enabled by default and could be tricked by a malicious server into leaking client memory to the server, including private client user keys,&quot; OpenSSH officials wrote in an advisory published Thursday. &quot;The authentication of the server host key prevents exploitation by a man-in-the-middle, so this information leak is restricted to connections to malicious or compromised servers.&quot;

The advisory said that anyone using a vulnerable version should update right away. Those who are unable to update should disable roaming by adding the string UseRoaming no to the global ssh_config(5) file or to the user configuration]]></description>
		<content:encoded><![CDATA[<p>Bug that can leak crypto keys just fixed in widely used OpenSSH<br />
Vulnerability allows malicious servers to read memory on connecting computers.<br />
<a href="http://arstechnica.com/security/2016/01/bug-that-can-leak-crypto-keys-just-fixed-in-widely-used-openssh/" rel="nofollow">http://arstechnica.com/security/2016/01/bug-that-can-leak-crypto-keys-just-fixed-in-widely-used-openssh/</a></p>
<p>A critical bug that can leak secret cryptographic keys has just just been fixed in OpenSSH, one of the more widely used implementations of the secure shell (SSH) protocol.</p>
<p>The vulnerability resides only in the version end users use to connect to servers and not in versions used by servers. A maliciously configured server could exploit it to obtain the contents of the connecting computer&#8217;s memory, including the private encryption key used for SSH connections. The bug is the result of code that enables an experimental roaming feature in OpenSSH versions 5.4 to 7.1</p>
<p>&#8220;The matching server code has never been shipped, but the client code was enabled by default and could be tricked by a malicious server into leaking client memory to the server, including private client user keys,&#8221; OpenSSH officials wrote in an advisory published Thursday. &#8220;The authentication of the server host key prevents exploitation by a man-in-the-middle, so this information leak is restricted to connections to malicious or compromised servers.&#8221;</p>
<p>The advisory said that anyone using a vulnerable version should update right away. Those who are unable to update should disable roaming by adding the string UseRoaming no to the global ssh_config(5) file or to the user configuration</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1467144</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 10:15:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1467144</guid>
		<description><![CDATA[Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
http://seclists.org/oss-sec/2016/q1/97

Qualys Security Advisory
Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778


Since version 5.4 (released on March 8, 2010), the OpenSSH client
supports an undocumented feature called roaming: if the connection to an
SSH server breaks unexpectedly, and if the server supports roaming as
well, the client is able to reconnect to the server and resume the
suspended SSH session.

Although roaming is not supported by the OpenSSH server, it is enabled
by default in the OpenSSH client, and contains two vulnerabilities that
can be exploited by a malicious SSH server (or a trusted but compromised
server): an information leak (memory disclosure), and a buffer overflow
(heap-based).

The information leak is exploitable in the default configuration of the
OpenSSH client, and (depending on the client&#039;s version, compiler, and
operating system) allows a malicious SSH server to steal the client&#039;s
private keys. This information leak may have already been exploited in
the wild by sophisticated attackers, and high-profile sites or users may
need to regenerate their SSH keys accordingly.

The buffer overflow, on the other hand, is present in the default
configuration of the OpenSSH client but its exploitation requires two
non-default options: a ProxyCommand, and either ForwardAgent (-A) or
ForwardX11 (-X). This buffer overflow is therefore unlikely to have any
real-world impact, but provides a particularly interesting case study.

All OpenSSH versions between 5.4 and 7.1 are vulnerable, but can be
easily hot-fixed by setting the undocumented option &quot;UseRoaming&quot; to
&quot;no&quot;, as detailed in the Mitigating Factors section. OpenSSH version
7.1p2 (released on January 14, 2016) disables roaming by default.

Private Key Disclosure
------------------------------------------------------------------------

We initially believed that this information leak in the OpenSSH client&#039;s
roaming code would not allow a malicious SSH server to steal the
client&#039;s private keys, because:

- the information leaked is not read from out-of-bounds memory, but from
  a previously free()d chunk of memory that is recycled to malloc()ate
  the client&#039;s roaming buffer out_buf;

- private keys are loaded from disk into memory and freed by key_free()
  (old API, OpenSSH = 6.7),
  and both functions properly cleanse the private keys&#039; memory with
  OPENSSL_cleanse() or explicit_bzero();

- temporary copies of in-memory private keys are freed by buffer_free()
  (old API) or sshbuf_free() (new API), and both functions attempt to
  cleanse these copies with memset() or bzero().

Mitigating Factors
------------------------------------------------------------------------

This information leak affects all OpenSSH clients &gt;= 5.4, but its impact
is slightly reduced by the following four reasons:

1. The vulnerable roaming code can be permanently disabled by adding the
undocumented option &quot;UseRoaming no&quot; to the system-wide configuration
file 

2. If an OpenSSH client is disconnected from an SSH server that offers
roaming, it prints &quot;[connection suspended, press return to resume]&quot; on
stderr, and waits for &#039;\n&#039; or &#039;\r&#039; on stdin (and not on the controlling
terminal) before it reconnects to the server; advanced users may become
suspicious and press Control-C or Control-Z instead, thus avoiding the
information leak:

3. Although a man-in-the-middle attacker can reset the TCP connection
between an OpenSSH client and an OpenSSH server (which does not support
roaming), it cannot exploit the information leak without breaking server
host authentication or integrity protection

In conclusion, an attacker who wishes to exploit this information leak
must convince its target OpenSSH client to connect to a malicious server
(an unlikely scenario), or compromise a trusted server (a more likely
scenario, for a determined attacker).

4. We discovered several non-security bugs, in specific versions and
configurations of OpenSSH, that prevent the client&#039;s roaming code from
reconnecting to the server and, as a result, prevent this information
leak from being exploited.]]></description>
		<content:encoded><![CDATA[<p>Qualys Security Advisory &#8211; Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778<br />
<a href="http://seclists.org/oss-sec/2016/q1/97" rel="nofollow">http://seclists.org/oss-sec/2016/q1/97</a></p>
<p>Qualys Security Advisory<br />
Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778</p>
<p>Since version 5.4 (released on March 8, 2010), the OpenSSH client<br />
supports an undocumented feature called roaming: if the connection to an<br />
SSH server breaks unexpectedly, and if the server supports roaming as<br />
well, the client is able to reconnect to the server and resume the<br />
suspended SSH session.</p>
<p>Although roaming is not supported by the OpenSSH server, it is enabled<br />
by default in the OpenSSH client, and contains two vulnerabilities that<br />
can be exploited by a malicious SSH server (or a trusted but compromised<br />
server): an information leak (memory disclosure), and a buffer overflow<br />
(heap-based).</p>
<p>The information leak is exploitable in the default configuration of the<br />
OpenSSH client, and (depending on the client&#8217;s version, compiler, and<br />
operating system) allows a malicious SSH server to steal the client&#8217;s<br />
private keys. This information leak may have already been exploited in<br />
the wild by sophisticated attackers, and high-profile sites or users may<br />
need to regenerate their SSH keys accordingly.</p>
<p>The buffer overflow, on the other hand, is present in the default<br />
configuration of the OpenSSH client but its exploitation requires two<br />
non-default options: a ProxyCommand, and either ForwardAgent (-A) or<br />
ForwardX11 (-X). This buffer overflow is therefore unlikely to have any<br />
real-world impact, but provides a particularly interesting case study.</p>
<p>All OpenSSH versions between 5.4 and 7.1 are vulnerable, but can be<br />
easily hot-fixed by setting the undocumented option &#8220;UseRoaming&#8221; to<br />
&#8220;no&#8221;, as detailed in the Mitigating Factors section. OpenSSH version<br />
7.1p2 (released on January 14, 2016) disables roaming by default.</p>
<p>Private Key Disclosure<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</p>
<p>We initially believed that this information leak in the OpenSSH client&#8217;s<br />
roaming code would not allow a malicious SSH server to steal the<br />
client&#8217;s private keys, because:</p>
<p>- the information leaked is not read from out-of-bounds memory, but from<br />
  a previously free()d chunk of memory that is recycled to malloc()ate<br />
  the client&#8217;s roaming buffer out_buf;</p>
<p>- private keys are loaded from disk into memory and freed by key_free()<br />
  (old API, OpenSSH = 6.7),<br />
  and both functions properly cleanse the private keys&#8217; memory with<br />
  OPENSSL_cleanse() or explicit_bzero();</p>
<p>- temporary copies of in-memory private keys are freed by buffer_free()<br />
  (old API) or sshbuf_free() (new API), and both functions attempt to<br />
  cleanse these copies with memset() or bzero().</p>
<p>Mitigating Factors<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</p>
<p>This information leak affects all OpenSSH clients &gt;= 5.4, but its impact<br />
is slightly reduced by the following four reasons:</p>
<p>1. The vulnerable roaming code can be permanently disabled by adding the<br />
undocumented option &#8220;UseRoaming no&#8221; to the system-wide configuration<br />
file </p>
<p>2. If an OpenSSH client is disconnected from an SSH server that offers<br />
roaming, it prints &#8220;[connection suspended, press return to resume]&#8221; on<br />
stderr, and waits for &#8216;\n&#8217; or &#8216;\r&#8217; on stdin (and not on the controlling<br />
terminal) before it reconnects to the server; advanced users may become<br />
suspicious and press Control-C or Control-Z instead, thus avoiding the<br />
information leak:</p>
<p>3. Although a man-in-the-middle attacker can reset the TCP connection<br />
between an OpenSSH client and an OpenSSH server (which does not support<br />
roaming), it cannot exploit the information leak without breaking server<br />
host authentication or integrity protection</p>
<p>In conclusion, an attacker who wishes to exploit this information leak<br />
must convince its target OpenSSH client to connect to a malicious server<br />
(an unlikely scenario), or compromise a trusted server (a more likely<br />
scenario, for a determined attacker).</p>
<p>4. We discovered several non-security bugs, in specific versions and<br />
configurations of OpenSSH, that prevent the client&#8217;s roaming code from<br />
reconnecting to the server and, as a result, prevent this information<br />
leak from being exploited.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1467136</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 09:35:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1467136</guid>
		<description><![CDATA[Related posting: http://www.epanorama.net/newepa/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/]]></description>
		<content:encoded><![CDATA[<p>Related posting: <a href="http://www.epanorama.net/newepa/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/" rel="nofollow">http://www.epanorama.net/newepa/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1467133</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 09:34:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1467133</guid>
		<description><![CDATA[OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778 
http://undeadly.org/cgi?action=article&amp;sid=20160114142733

This is the most serious bug you&#039;ll hear about this week: the issues identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778. 
An early heads up came from Theo de Raadt in this mailing list posting. 
Until you are able to patch affected systems, the recommended workaround is to use 


UPDATE: This affects OpenSSH versions 5.4 through 7.1. 
UPDATE: The following commit from deraadt@ has just gone in: 
CVSROOT:        /cvs
Module name:    src
Changes by:     deraadt@cvs.openbsd.org 2016/01/14 07:34:34

Modified files:
        usr.bin/ssh    : readconf.c ssh.c

Log message:
Disable experimental client-side roaming support.  Server side was
disabled/gutted for years already, but this aspect was surprisingly
forgotten. Thanks for report from Qualys


USN-2869-1: OpenSSH vulnerabilities
http://www.ubuntu.com/usn/usn-2869-1/

Details
It was discovered that the OpenSSH client experimental support for resuming
connections contained multiple security issues. A malicious server could
use this issue to leak client memory to the server, including private
client user keys.]]></description>
		<content:encoded><![CDATA[<p>OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778<br />
<a href="http://undeadly.org/cgi?action=article&#038;sid=20160114142733" rel="nofollow">http://undeadly.org/cgi?action=article&#038;sid=20160114142733</a></p>
<p>This is the most serious bug you&#8217;ll hear about this week: the issues identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778.<br />
An early heads up came from Theo de Raadt in this mailing list posting.<br />
Until you are able to patch affected systems, the recommended workaround is to use </p>
<p>UPDATE: This affects OpenSSH versions 5.4 through 7.1.<br />
UPDATE: The following commit from deraadt@ has just gone in:<br />
CVSROOT:        /cvs<br />
Module name:    src<br />
Changes by:     <a href="mailto:deraadt@cvs.openbsd.org">deraadt@cvs.openbsd.org</a> 2016/01/14 07:34:34</p>
<p>Modified files:<br />
        usr.bin/ssh    : readconf.c ssh.c</p>
<p>Log message:<br />
Disable experimental client-side roaming support.  Server side was<br />
disabled/gutted for years already, but this aspect was surprisingly<br />
forgotten. Thanks for report from Qualys</p>
<p>USN-2869-1: OpenSSH vulnerabilities<br />
<a href="http://www.ubuntu.com/usn/usn-2869-1/" rel="nofollow">http://www.ubuntu.com/usn/usn-2869-1/</a></p>
<p>Details<br />
It was discovered that the OpenSSH client experimental support for resuming<br />
connections contained multiple security issues. A malicious server could<br />
use this issue to leak client memory to the server, including private<br />
client user keys.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/comment-page-1/#comment-1467132</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 09:33:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37933#comment-1467132</guid>
		<description><![CDATA[Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt

Since version 5.4 (released on March 8, 2010), the OpenSSH client
supports an undocumented feature called roaming: if the connection to an
SSH server breaks unexpectedly, and if the server supports roaming as
well, the client is able to reconnect to the server and resume the
suspended SSH session.

Although roaming is not supported by the OpenSSH server, it is enabled
by default in the OpenSSH client, and contains two vulnerabilities that
can be exploited by a malicious SSH server (or a trusted but compromised
server): an information leak (memory disclosure), and a buffer overflow
(heap-based).

The information leak is exploitable in the default configuration of the
OpenSSH client, and (depending on the client&#039;s version, compiler, and
operating system) allows a malicious SSH server to steal the client&#039;s
private keys. This information leak may have already been exploited in
the wild by sophisticated attackers, and high-profile sites or users may
need to regenerate their SSH keys accordingly.]]></description>
		<content:encoded><![CDATA[<p>Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778<br />
<a href="https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt" rel="nofollow">https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt</a></p>
<p>Since version 5.4 (released on March 8, 2010), the OpenSSH client<br />
supports an undocumented feature called roaming: if the connection to an<br />
SSH server breaks unexpectedly, and if the server supports roaming as<br />
well, the client is able to reconnect to the server and resume the<br />
suspended SSH session.</p>
<p>Although roaming is not supported by the OpenSSH server, it is enabled<br />
by default in the OpenSSH client, and contains two vulnerabilities that<br />
can be exploited by a malicious SSH server (or a trusted but compromised<br />
server): an information leak (memory disclosure), and a buffer overflow<br />
(heap-based).</p>
<p>The information leak is exploitable in the default configuration of the<br />
OpenSSH client, and (depending on the client&#8217;s version, compiler, and<br />
operating system) allows a malicious SSH server to steal the client&#8217;s<br />
private keys. This information leak may have already been exploited in<br />
the wild by sophisticated attackers, and high-profile sites or users may<br />
need to regenerate their SSH keys accordingly.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
