Dropbear SSH Server Use-after-free Vulnerability

Summary
This host is installed with Dropbear SSH Server and is prone to a use-after-free vulnerability.
Impact
This flaw allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to channels concurrency.
Solution
Updates are available.
Insight
A use-after-free vulnerability exists in Dropbear SSH Server 0.52 through 2011.54 when command restriction and public key authentication are enabled.
Affected
Versions of Dropbear SSH Server 0.52 through 2011.54 are vulnerable.
Detection
Check the version.
References