MEDIUM · 6.5

CVE-2005-4178

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression...

Vulnerability Description

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.

CVSS Score

6.5

MEDIUM

AV:N/AC:L/Au:S/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Dropbear Ssh ProjectDropbear Ssh< 0.47
DebianDebian Linux3.0

References

FAQ

What is CVE-2005-4178?

CVE-2005-4178 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression...

How severe is CVE-2005-4178?

CVE-2005-4178 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2005-4178?

Check the references section above for vendor advisories and patch information. Affected products include: Dropbear Ssh Project Dropbear Ssh, Debian Debian Linux.