CVE-2005-4178
Summary
| CVE | CVE-2005-4178 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-12-12 21:03:00 UTC |
| Updated | 2018-10-30 16:28:00 UTC |
| Description | Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.0 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Operating System | Debian | Debian Linux | 3.0 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Application | Dropbear Ssh Project | Dropbear Ssh | All | All | All | All |
| Application | Dropbear Ssh Project | Dropbear Ssh | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Secunia - Advisories - Dropbear SSH Server Buffer Overflow Vulnerability | SECUNIA | secunia.com | Third Party Advisory |
| Dropbear SSH Server Remote Buffer Overflow Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Dropbear SSH server and client | MISC | matt.ucc.asn.au | Patch, Vendor Advisory |
| Secunia - Advisories - Debian update for dropbear | SECUNIA | secunia.com | Third Party Advisory |
| Gentoo update for dropbear - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Gentoo Linux Documentation -- Dropbear: Privilege escalation | GENTOO | www.gentoo.org | Third Party Advisory |
| Webmail | OVH- OVH | VUPEN | www.vupen.com | Third Party Advisory |
| Dropbear 0.47 (and security fix) | MLIST | lists.ucc.gu.uwa.edu.au | Patch, Vendor Advisory |
| Debian -- Security Information -- DSA-923-1 dropbear | DEBIAN | www.debian.org | Third Party Advisory |
| Dropbear SSH Server Remote Buffer Overflow Vulnerability | MITRE | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.