DSA-2456-1 dropbear -- use after free

Related Vulnerabilities: CVE-2012-0920  

Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code. Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place. For the stable distribution (squeeze), this problem has been fixed in version 0.52-5+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 2012.55-1. For the unstable distribution (sid), this problem has been fixed in version 2012.55-1. We recommend that you upgrade your dropbear packages.

Debian Security Advisory

DSA-2456-1 dropbear -- use after free

Date Reported:
23 Apr 2012
Affected Packages:
dropbear
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2012-0920.
More information:

Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code. Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place.

For the stable distribution (squeeze), this problem has been fixed in version 0.52-5+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in version 2012.55-1.

For the unstable distribution (sid), this problem has been fixed in version 2012.55-1.

We recommend that you upgrade your dropbear packages.