CVE-2012-0920

NameCVE-2012-0920
DescriptionUse-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2456-1
Debian Bugs661150

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dropbear (PTS)buster2018.76-5+deb10u1fixed
buster (security)2018.76-5+deb10u2fixed
bullseye2020.81-3+deb11u1fixed
bookworm2022.83-1+deb12u1fixed
sid, trixie2024.84-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dropbearsourcesqueeze0.52-5+squeeze1DSA-2456-1
dropbearsource(unstable)2012.55-1low661150

Notes

this is limited to authenticated users with enforced command restrictions

Search for package or bug name: Reporting problems