U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-0778

Change History

Modified Analysis by NIST 9/08/2016 3:53:07 PM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     OR
          *cpe:2.3:o:apple:mac_os_x:10.11.3:*:*:*:*:*:*:* (and previous)
Configuration 2
     OR
          *cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.3:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.2:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.1:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*
Configuration 1
     OR
          *cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:apple:mac_os_x:10.10.5:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:apple:mac_os_x:10.11.3:*:*:*:*:*:*:* (and previous)
Configuration 2
     OR
          *cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*
Configuration 3
     OR
          *cpe:2.3:o:hp:virtual_customer_access_system:15.07:*:*:*:*:*:*:* (and previous)
Configuration 4
     OR
          *cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*
          *cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*
Changed CVSS V2
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
(AV:N/AC:H/Au:S/C:P/I:P/A:P)
Changed CVSS V3
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html No Types Assigned
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html Release Notes, Third Party Advisory, Mailing List
Changed Reference Type
http://www.openssh.com/txt/release-7.1p2 Vendor Advisory
http://www.openssh.com/txt/release-7.1p2 Release Notes, Vendor Advisory, Patch
Changed Reference Type
http://www.openwall.com/lists/oss-security/2016/01/14/7 No Types Assigned
http://www.openwall.com/lists/oss-security/2016/01/14/7 Third Party Advisory, Mailing List, Technical Description, Exploit
Changed Reference Type
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ No Types Assigned
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ Release Notes
Changed Reference Type
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ No Types Assigned
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ Release Notes
Changed Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 Third Party Advisory