Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-2385

Overview

Vulnerability Score 4.0 4.0
CVE Id CVE-2012-2385
Last Modified 16 Aug 2012 11:52:50
Published 29 Jun 2012 03:55:03
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication SINGLE_INSTANCE

CVE-2012-2385

Summary

The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.

Vulnerable Systems

Application

  • Keith Winstein Mosh 0.98c

  • Keith Winstein Mosh 1.0

  • Keith Winstein Mosh 1.1

  • Keith Winstein Mosh 1.1.1

  • Keith Winstein Mosh 1.1.2

  • Keith Winstein Mosh 1.1.3

  • Keith Winstein Mosh 1.1.3-1

  • Keith Winstein Mosh 1.1.3-2

  • Keith Winstein Mosh 1.2

  • Keith Winstein Mosh 1.2-2


References

CONFIRM - https://github.com/keithw/mosh/issues/271

CONFIRM - https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e

CONFIRM - https://github.com/keithw/mosh/blob/master/ChangeLog

MISC - https://bugzilla.redhat.com/show_bug.cgi?id=823943

MLIST - [oss-security] 20120522 Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher

FEDORA - FEDORA-2012-9442

FEDORA - FEDORA-2012-9414

FEDORA - FEDORA-2012-9422

XF - mosh-sequences-dos(75779)

BID - 53646

SECUNIA - 49260


Last Updated: 27 May 2016 10:54:49