CVE-2012-0920

NameCVE-2012-0920
DescriptionUse-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2456-1
NVD severityhigh (attack range: remote)
Debian Bugs661150

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dropbear (PTS)wheezy2012.55-1.3fixed
jessie2014.65-1fixed
stretch, sid2016.73-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dropbearsource(unstable)2012.55-1low661150
dropbearsourcesqueeze0.52-5+squeeze1highDSA-2456-1

Notes

this is limited to authenticated users with enforced command restrictions

Search for package or bug name: Reporting problems