Dropbear SSH Server Use After Free Remote Code Execution Vulnerability
BID:52159
Info
Dropbear SSH Server Use After Free Remote Code Execution Vulnerability
| Bugtraq ID: | 52159 |
| Class: | Design Error |
| CVE: |
CVE-2012-0920 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 24 2012 12:00AM |
| Updated: | May 23 2017 04:28PM |
| Credit: | Danny Fullerton |
| Vulnerable: |
Oracle Communications Session Border Controller SCZ7.4.0 Oracle Communications Session Border Controller SCZ7.3.0 Oracle Communications Session Border Controller SCZ7.2.0 Gentoo Linux Dropbear SSH Server 2011.54 Dropbear SSH Server 0.52 Debian Linux 6.0 sparc Debian Linux 6.0 s/390 Debian Linux 6.0 powerpc Debian Linux 6.0 mips Debian Linux 6.0 ia-64 Debian Linux 6.0 ia-32 Debian Linux 6.0 arm Debian Linux 6.0 amd64 |
| Not Vulnerable: |
Dropbear SSH Server 2012.55 |
Discussion
Dropbear SSH Server Use After Free Remote Code Execution Vulnerability
Dropbear SSH Server is prone to a remote code-execution vulnerability due to a use-after-free error.
An attacker can leverage this issue to execute arbitrary code with root-level privileges. This may allow an attacker to fully compromise the vulnerable system.
Note: To exploit the issue an attacker must be authenticated using a public key and a command restriction is enforced.
Dropbear SSH Server versions from 0.52 to 2011.54 are vulnerable.
Dropbear SSH Server is prone to a remote code-execution vulnerability due to a use-after-free error.
An attacker can leverage this issue to execute arbitrary code with root-level privileges. This may allow an attacker to fully compromise the vulnerable system.
Note: To exploit the issue an attacker must be authenticated using a public key and a command restriction is enforced.
Dropbear SSH Server versions from 0.52 to 2011.54 are vulnerable.
Exploit / POC
Dropbear SSH Server Use After Free Remote Code Execution Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Dropbear SSH Server Use After Free Remote Code Execution Vulnerability
Solution:
Updates are available. Please see the references for more information.
Solution:
Updates are available. Please see the references for more information.
References
Dropbear SSH Server Use After Free Remote Code Execution Vulnerability
References:
References:
- dropbear changeset 654:818108bf7749 (Dropbear)
- Dropbear SSH Server Homepage (Dropbear)
- Oracle Critical Patch Update Advisory - April 2017 (Oracle)