Vulnerability Name: | CVE-2012-0920 (CCN-73444) | ||||||||||||
Assigned: | 2012-02-24 | ||||||||||||
Published: | 2012-02-24 | ||||||||||||
Updated: | 2018-10-30 | ||||||||||||
Summary: | Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency." | ||||||||||||
CVSS v3 Severity: | 8.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-0920 Source: CONFIRM Type: Vendor Advisory http://matt.ucc.asn.au/dropbear/CHANGES Source: CCN Type: SA48147 Dropbear SSH Server Use-After-Free Vulnerability Source: SECUNIA Type: Third Party Advisory 48147 Source: SECUNIA Type: Third Party Advisory 48929 Source: DEBIAN Type: Third Party Advisory DSA-2456 Source: DEBIAN Type: DSA-2456 dropbear -- use after free Source: CCN Type: Oracle CPUApr2017 Oracle Critical Patch Update Advisory - April 2017 Source: OSVDB Type: Broken Link 79590 Source: CCN Type: OSVDB ID: 79590 Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution Source: BID Type: Third Party Advisory, VDB Entry 52159 Source: CCN Type: BID-52159 Dropbear SSH Server Use After Free Remote Code Execution Vulnerability Source: XF Type: Third Party Advisory, VDB Entry dropbear-code-execution(73444) Source: XF Type: UNKNOWN dropbear-code-execution(73444) Source: CCN Type: Dropbear Web page changeset 654:818108bf7749 Source: CONFIRM Type: Vendor Advisory https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749 Source: MISC Type: Third Party Advisory https://www.mantor.org/~northox/misc/CVE-2012-0920.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |