<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dropbear SSH Server &amp;lt; 2016.72 Multiple Vulnerabilities in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6148#M921</link>
    <description>Hello David,&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Dropbear is used as the webserver on APs and ZD's SSH, and not on Solo APs, and this&lt;BR /&gt;will be fixed in ZD 10.0.&amp;nbsp; See security advisory on &lt;A href="https://www.ruckuswireless.com/security" rel="nofollow" title="Link: https://www.ruckuswireless.com/security"&gt;https://www.ruckuswireless.com/security&lt;/A&gt;.</description>
    <pubDate>Mon, 07 Nov 2016 18:40:41 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2016-11-07T18:40:41Z</dc:date>
    <item>
      <title>Dropbear SSH Server &lt; 2016.72 Multiple Vulnerabilities</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6147#M920</link>
      <description>We have found the vulnerability below and I wonder is there an update we can apply to patch against this. We are currently at version&amp;nbsp;9.10.0.0 build 218.&lt;BR /&gt;&lt;BR /&gt;Vulnerability details as follows:&lt;BR /&gt;DescriptionAccording to its self-reported version in its banner, Dropbear SSH running on the remote host is prior to 2016.74. It is, therefore, affected by the following vulnerabilities :&lt;BR /&gt;&lt;BR /&gt;- A format string flaw exists due to improper handling of string format specifiers (e.g., %s and %x) in usernames and host arguments. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2016-7406)&lt;BR /&gt;&lt;BR /&gt;- A flaw exists in dropbearconvert due to improper handling of specially crafted OpenSSH key files. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2016-7407)&lt;BR /&gt;&lt;BR /&gt;- A flaw exists in dbclient when handling the -m or -c arguments in scripts. An unauthenticated, remote attacker can exploit this, via a specially crafted script, to execute arbitrary code. (CVE-2016-7408)&lt;BR /&gt;&lt;BR /&gt;- A flaw exists in dbclient or dropbear server if they are compiled with the DEBUG_TRACE option and then run using the -v switch. A local attacker can exploit this to disclose process memory. (CVE-2016-7409)&lt;BR /&gt;&lt;BR /&gt;Solution&lt;BR /&gt;Upgrade to Dropbear SSH version 2016.74 or later.&lt;BR /&gt;&lt;BR /&gt;See Also&lt;BR /&gt;&lt;A href="https://matt.ucc.asn.au/dropbear/CHANGES" rel="nofollow" target="_blank" title="Link: https://matt.ucc.asn.au/dropbear/CHANGES"&gt;https://matt.ucc.asn.au/dropbear/CHANGES&lt;/A&gt;</description>
      <pubDate>Mon, 07 Nov 2016 15:35:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6147#M920</guid>
      <dc:creator>david_fay_9yn2u</dc:creator>
      <dc:date>2016-11-07T15:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH Server &lt; 2016.72 Multiple Vulnerabilities</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6148#M921</link>
      <description>Hello David,&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Dropbear is used as the webserver on APs and ZD's SSH, and not on Solo APs, and this&lt;BR /&gt;will be fixed in ZD 10.0.&amp;nbsp; See security advisory on &lt;A href="https://www.ruckuswireless.com/security" rel="nofollow" title="Link: https://www.ruckuswireless.com/security"&gt;https://www.ruckuswireless.com/security&lt;/A&gt;.</description>
      <pubDate>Mon, 07 Nov 2016 18:40:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6148#M921</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2016-11-07T18:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH Server &lt; 2016.72 Multiple Vulnerabilities</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6149#M922</link>
      <description>Do you know the provisional release date for this? I couldn't see&amp;nbsp;CVE-2016-7406 in these advisories.</description>
      <pubDate>Mon, 07 Nov 2016 18:55:17 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities/m-p/6149#M922</guid>
      <dc:creator>david_fay_9yn2u</dc:creator>
      <dc:date>2016-11-07T18:55:17Z</dc:date>
    </item>
  </channel>
</rss>

