CVE-2012-0920

NameCVE-2012-0920
DescriptionUse-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2456-1
NVD severityhigh (attack range: remote)
Debian Bugs661150
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dropbear (PTS)squeeze, squeeze (security)0.52-5+squeeze1fixed
wheezy2012.55-1.3fixed
stretch, sid, jessie2014.65-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dropbearsource(unstable)2012.55-1low661150
dropbearsourcesqueeze0.52-5+squeeze1highDSA-2456-1

Notes

this is limited to authenticated users with enforced command restrictions

Search for package or bug name: Reporting problems