CVE-2012-0920
Summary
| CVE | CVE-2012-0920 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-06-05 22:55:00 UTC |
| Updated | 2018-10-30 16:28:00 UTC |
| Description | Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency." |
Risk And Classification
Problem Types: CWE-399
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 6.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 6.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Application | Dropbear Ssh Project | Dropbear Ssh | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Dropbear SSH Server Use After Free Remote Code Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| matt.ucc.asn.au/dropbear/CHANGES | CONFIRM | matt.ucc.asn.au | Vendor Advisory |
| 79590 | OSVDB | www.osvdb.org | Broken Link |
| CVE-2012-0920 - Dropbear SSH server use-after-free vulnerability | MISC | www.mantor.org | Third Party Advisory |
| About Secunia Research | Flexera | SECUNIA | secunia.com | Third Party Advisory |
| dropbear: 818108bf7749 | CONFIRM | secure.ucc.asn.au | Vendor Advisory |
| About Secunia Research | Flexera | SECUNIA | secunia.com | Third Party Advisory |
| Debian -- Security Information -- DSA-2456-1 dropbear | DEBIAN | www.debian.org | Third Party Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.