HIGH · 7.1

CVE-2012-0920

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary cod...

Vulnerability Description

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

CVSS Score

7.1

HIGH

AV:N/AC:H/Au:S/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
Dropbear Ssh ProjectDropbear Ssh>= 0.52, <= 2012.54
DebianDebian Linux6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-0920?

CVE-2012-0920 is a vulnerability with a CVSS score of 7.1 (HIGH). Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary cod...

How severe is CVE-2012-0920?

CVE-2012-0920 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-0920?

Check the references section above for vendor advisories and patch information. Affected products include: Dropbear Ssh Project Dropbear Ssh, Debian Debian Linux.