7.1
CVSSv2

CVE-2012-0920

Published: 05/06/2012 Updated: 30/10/2018
CVSS v2 Base Score: 7.1 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 632
Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in Dropbear SSH Server 0.52 up to and including 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dropbear ssh project dropbear ssh

debian debian linux 6.0

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #661150 dropbear: CVE-2012-0920 SSH server use-after-free vulnerability] Package: src:dropbear; Maintainer for src:dropbear is Guilhem Moulin <guilhem@debianorg>; Reported by: Nico Golde <nion@debianorg> Date: Fri, 24 Feb 2012 14:57:02 UTC Severity: grave Tags: patch, security Found in ver ...
Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place For the stable distribution (squeeze), this problem has been fixed in version 05 ...