CVE-2005-4178
Summary
| CVE | CVE-2005-4178 |
|---|---|
| State | PUBLISHED |
| Assigner | debian |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-12-12 21:03:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations. |
Risk And Classification
Primary CVSS: v2.0 6.5 from [email protected]
AV:N/AC:L/Au:S/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
SingleConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:S/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.0 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Application | Dropbear Ssh Project | Dropbear Ssh | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Dropbear 0.47 (and security fix) | af854a3a-2127-422b-91ae-364da2661108 | lists.ucc.gu.uwa.edu.au | Patch, Vendor Advisory |
| Secunia - Advisories - Dropbear SSH Server Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Third Party Advisory |
| Webmail | OVH- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Third Party Advisory |
| Gentoo Linux Documentation -- Dropbear: Privilege escalation | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | Third Party Advisory |
| Dropbear SSH server and client | af854a3a-2127-422b-91ae-364da2661108 | matt.ucc.asn.au | Patch, Vendor Advisory |
| Secunia - Advisories - Debian update for dropbear | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Third Party Advisory |
| Gentoo update for dropbear - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Third Party Advisory |
| Debian -- Security Information -- DSA-923-1 dropbear | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Dropbear SSH Server Remote Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Dropbear SSH Server Remote Buffer Overflow Vulnerability | MITRE | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.