CVE-2012-0920

NameCVE-2012-0920
DescriptionUse-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2456-1
NVD severityhigh
Debian Bugs661150

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dropbear (PTS)stretch2016.74-5+deb9u1fixed
buster2018.76-5fixed
bullseye2020.81-3fixed
bookworm, sid2020.81-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dropbearsourcesqueeze0.52-5+squeeze1DSA-2456-1
dropbearsource(unstable)2012.55-1low661150

Notes

this is limited to authenticated users with enforced command restrictions

Search for package or bug name: Reporting problems