Summary
Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code. Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place.
Solution
For the stable distribution (squeeze), this problem has been fixed in version 0.52-5+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in version 2012.55-1.
For the unstable distribution (sid), this problem has been fixed in version 2012.55-1.
We recommend that you upgrade your dropbear packages.
Insight
dropbear is a SSH 2 server and client designed to be small enough to be used in small memory environments, while still being functional and secure enough for general use.
Affected
dropbear on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-0920 -
CVSS Base Score: 7.1
AV:N/AC:H/Au:S/C:C/I:C/A:C
Related Vulnerabilities