Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-0920

Overview

Vulnerability Score 7.1 7.1
CVE Id CVE-2012-0920
Last Modified 20 Jun 2012 12:00:00
Published 05 Jun 2012 06:55:09
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity HIGH
Authentication SINGLE_INSTANCE

CVE-2012-0920

Summary

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

Vulnerable Systems

Application

  • Matt Johnston Dropbear Ssh Server 0.52

  • Matt Johnston Dropbear Ssh Server 0.53

  • Matt Johnston Dropbear Ssh Server 0.53.1

  • Matt Johnston Dropbear Ssh Server 2011.54

  • Matt Johnston Dropbear Ssh Server 2012.54


References

MISC - https://www.mantor.org/~northox/misc/CVE-2012-0920.html

CONFIRM - https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749

XF - dropbear-code-execution(73444)

BID - 52159

OSVDB - 79590

DEBIAN - DSA-2456

SECUNIA - 48929

SECUNIA - 48147

CONFIRM - http://matt.ucc.asn.au/dropbear/CHANGES


Last Updated: 27 May 2016 10:49:36