Summary
The remote host is missing an update to libssh
announced via advisory DSA 2577-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202577-1
Insight
Multiple vulnerabilities were discovered in libssh by Florian Weimer and Xi Wang:
CVE-2012-4559: multiple double free() flaws
CVE-2012-4561: multiple invalid free() flaws
CVE-2012-4562: multiple improper overflow checks
Those could lead to a denial of service by making an ssh client linked to libssh crash, and maybe even arbitrary code execution.
For the stable distribution (squeeze), these problems have been fixed in version 0.4.5-3+squeeze1.
For the testing distribution (wheezy), these problems have been fixed in version 0.5.3-1.
For the unstable distribution (sid), these problems have been fixed in version 0.5.3-1.
We recommend that you upgrade your libssh packages.
Severity
Classification
-
CVE CVE-2012-4559, CVE-2012-4561, CVE-2012-4562 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities