Support Center > Search Results > SecureKnowledge Details
Check Point Response to OpenSSH Client vulnerabilities: CVE-2016-0777 and CVE-2016-0778 Technical Level
Symptoms
  • Qualys Security team discovered two vulnerabilities in the roaming code of the OpenSSH client (CVE-2016-0777 and CVE-2016-0778):

    SSH roaming enables a client, in case an SSH connection breaks unexpectedly, to resume it at a later time, provided the SSH server also supports it.
Solution

The exploitation scenario is only applicable to OpenSSH client that connects to a malicious SSH Server (e.g., refer to OpenBSD Journal - OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778).

Check Point Products are not vulnerable because a hardened OpenSSH is used (based on version 4.3).

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment