Executive Summary
Informations | |||
---|---|---|---|
Name | DSA-2456 | First vendor Publication | 2012-04-23 |
Vendor | Debian | Last vendor Modification | 2012-04-23 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | High |
Cvss Expoit Score | 3.9 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code. Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place. For the stable distribution (squeeze), this problem has been fixed in version 0.52-5+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 2012.55-1. For the unstable distribution (sid), this problem has been fixed in version 2012.55-1. We recommend that you upgrade your dropbear packages. |
Original Source
Url : http://www.debian.org/security/2012/dsa-2456 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18111 | |||
Oval ID: | oval:org.mitre.oval:def:18111 | ||
Title: | DSA-2456-1 dropbear - use after free | ||
Description: | Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code. Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2456-1 CVE-2012-0920 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | dropbear |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2456-1 (dropbear - use after free) File : nvt/deb_2456_1.nasl |
2012-07-30 | Name : Fedora Update for dropbear FEDORA-2012-10934 File : nvt/gb_fedora_2012_10934_dropbear_fc16.nasl |
2012-03-12 | Name : FreeBSD Ports: dropbear File : nvt/freebsd_dropbear.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-09-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-20.nasl - Type : ACT_GATHER_INFO |
2012-07-30 | Name : The remote Fedora host is missing a security update. File : fedora_2012-10934.nasl - Type : ACT_GATHER_INFO |
2012-04-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2456.nasl - Type : ACT_GATHER_INFO |
2012-03-05 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_eba70db4664011e198af00262d8b701d.nasl - Type : ACT_GATHER_INFO |
2012-03-01 | Name : The remote host is affected by a remote code execution vulnerability. File : dropbear_ssh_55.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:31:01 |
|
2013-09-20 17:21:19 |
|