var-201206-0202
Vulnerability from variot
Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency.". Dropbear SSH Server is a small Secure Shell server for embedded environments. A remote code execution vulnerability exists in Dropbear SSH Server that was caused by a post-release error. An attacker could exploit the vulnerability to execute arbitrary code with root-level privileges, which could allow an attacker to fully manipulate the affected system. Note: To exploit the issue an attacker must be authenticated using a public key and a command restriction is enforced.
Solution: Upgrade to version 2012.55 or higher. 2012-02-24 - Coordinated public release of advisory.
Credit: This vulnerability was discovered by Danny Fullerton from Mantor Organization. Special thanks to Matt. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges.
For more information: SA48147
SOLUTION: Apply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2456-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff April 23, 2012 http://www.debian.org/security/faq
Package : dropbear Vulnerability : use after free Problem type : remote Debian-specific: no CVE ID : CVE-2012-0920
Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code.
For the stable distribution (squeeze), this problem has been fixed in version 0.52-5+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in version 2012.55-1.
For the unstable distribution (sid), this problem has been fixed in version 2012.55-1.
We recommend that you upgrade your dropbear packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAk+XCosACgkQXm3vHE4uylrKpQCfZpU4eKxztqi8zGzsAKdxzhLV kOcAoIshssbewzstn+sNTIJyNP7MJ10i =uWaI -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Dropbear SSH Server Use-After-Free Vulnerability
SECUNIA ADVISORY ID: SA48147
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48147/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48147
RELEASE DATE: 2012-02-27
DISCUSS ADVISORY: http://secunia.com/advisories/48147/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48147/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48147
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Danny Fullerton has reported a vulnerability in Dropbear SSH Server, which can be exploited by malicious users to gain escalated privileges.
The vulnerability is reported in version 0.52 through 2011.54.
SOLUTION: Update to version 2012.55
PROVIDED AND/OR DISCOVERED BY: Danny Fullerton, Mantor Organization
ORIGINAL ADVISORY: Dropbear: http://matt.ucc.asn.au/dropbear/CHANGES
Danny Fullerton: http://archives.neohapsis.com/archives/fulldisclosure/2012-02/0404.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-20
http://security.gentoo.org/
Severity: Normal Title: Dropbear: Multiple vulnerabilities Date: September 26, 2013 Bugs: #328409, #405607 ID: 201309-20
Synopsis
Multiple vulnerabilities have been found in Dropbear, the worst of which could lead to arbitrary code execution.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/dropbear < 2012.55 >= 2012.55
Description
Multiple vulnerabilities have been discovered in Dropbear. Please review the CVE identifier and Gentoo bug referenced below for details.
Impact
A remote attacker could send a specially crafted request to trigger a use-after-free condition, possibly resulting in arbitrary code execution or a Denial of Service condition. Additionally, the bundled version of libtommath has an error in its prime number generation, which could result in the generation of weak keys.
Workaround
There is no known workaround at this time.
Resolution
All Dropbear users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dropbear-2012.55"
References
[ 1 ] CVE-2012-0920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0920 [ 2 ] libtommath Gentoo bug https://bugs.gentoo.org/show_bug.cgi?id=328383
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201309-20.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0202", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "7.0" }, { "model": "dropbear ssh", "scope": "gte", "trust": 1.0, "vendor": "dropbear ssh", "version": "0.52" }, { "model": "dropbear ssh", "scope": "lte", "trust": 1.0, "vendor": "dropbear ssh", "version": "2012.54" }, { "model": "ssh server", "scope": "eq", "trust": 0.9, "vendor": "dropbear", "version": "0.52" }, { "model": "dropbear ssh", "scope": "eq", "trust": 0.8, "vendor": "matt johnston", "version": "0.52 to 2012.54" }, { "model": "dropbear ssh server", "scope": "eq", "trust": 0.6, "vendor": "matt johnston", "version": "2012.54" }, { "model": "dropbear ssh server", "scope": "eq", "trust": 0.6, "vendor": "matt johnston", "version": "0.53" }, { "model": "dropbear ssh server", "scope": "eq", "trust": 0.6, "vendor": "matt johnston", "version": "0.52" }, { "model": "dropbear ssh server", "scope": "eq", "trust": 0.6, "vendor": "matt johnston", "version": "0.53.1" }, { "model": "dropbear ssh server", "scope": "eq", "trust": 0.6, "vendor": "matt johnston", "version": "2011.54" }, { "model": "communications session border controller scz7.4.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "communications session border controller scz7.3.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "communications session border controller scz7.2.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "ssh server", "scope": "eq", "trust": 0.3, "vendor": "dropbear", "version": "2011.54" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ssh server", "scope": "ne", "trust": 0.3, "vendor": "dropbear", "version": "2012.55" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "BID", "id": "52159" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "NVD", "id": "CVE-2012-0920" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2012.54", "versionStartIncluding": "0.52", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-0920" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Danny Fullerton", "sources": [ { "db": "BID", "id": "52159" }, { "db": "PACKETSTORM", "id": "110196" }, { "db": "CNNVD", "id": "CNNVD-201202-482" } ], "trust": 1.0 }, "cve": "CVE-2012-0920", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2012-0920", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2012-8994", "impactScore": 9.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-0920", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2012-8994", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201204-509", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2012-0920", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "VULMON", "id": "CVE-2012-0920" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "NVD", "id": "CVE-2012-0920" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to \"channels concurrency.\". Dropbear SSH Server is a small Secure Shell server for embedded environments. A remote code execution vulnerability exists in Dropbear SSH Server that was caused by a post-release error. An attacker could exploit the vulnerability to execute arbitrary code with root-level privileges, which could allow an attacker to fully manipulate the affected system. \nNote: To exploit the issue an attacker must be authenticated using a public key and a command restriction is enforced. \n\nSolution: Upgrade to version 2012.55 or higher. \n2012-02-24 - Coordinated public release of advisory. \n\nCredit:\nThis vulnerability was discovered by Danny Fullerton from Mantor\nOrganization. \nSpecial thanks to Matt. This fixes a vulnerability,\nwhich can be exploited by malicious users to gain escalated\nprivileges. \n\nFor more information:\nSA48147\n\nSOLUTION:\nApply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2456-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nApril 23, 2012 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : dropbear\nVulnerability : use after free\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2012-0920\n\nDanny Fullerton discovered a use-after-free in the Dropbear SSH daemon,\nresulting in potential execution of arbitrary code. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 0.52-5+squeeze1. \n\nFor the testing distribution (wheezy), this problem has been fixed in\nversion 2012.55-1. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2012.55-1. \n\nWe recommend that you upgrade your dropbear packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niEYEARECAAYFAk+XCosACgkQXm3vHE4uylrKpQCfZpU4eKxztqi8zGzsAKdxzhLV\nkOcAoIshssbewzstn+sNTIJyNP7MJ10i\n=uWaI\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nDropbear SSH Server Use-After-Free Vulnerability\n\nSECUNIA ADVISORY ID:\nSA48147\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48147/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48147\n\nRELEASE DATE:\n2012-02-27\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48147/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48147/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48147\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nDanny Fullerton has reported a vulnerability in Dropbear SSH Server,\nwhich can be exploited by malicious users to gain escalated\nprivileges. \n\nThe vulnerability is reported in version 0.52 through 2011.54. \n\nSOLUTION:\nUpdate to version 2012.55\n\nPROVIDED AND/OR DISCOVERED BY:\nDanny Fullerton, Mantor Organization\n\nORIGINAL ADVISORY:\nDropbear:\nhttp://matt.ucc.asn.au/dropbear/CHANGES\n\nDanny Fullerton:\nhttp://archives.neohapsis.com/archives/fulldisclosure/2012-02/0404.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201309-20\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Dropbear: Multiple vulnerabilities\n Date: September 26, 2013\n Bugs: #328409, #405607\n ID: 201309-20\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Dropbear, the worst of\nwhich could lead to arbitrary code execution. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/dropbear \u003c 2012.55 \u003e= 2012.55\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Dropbear. Please\nreview the CVE identifier and Gentoo bug referenced below for details. \n\nImpact\n======\n\nA remote attacker could send a specially crafted request to trigger a\nuse-after-free condition, possibly resulting in arbitrary code\nexecution or a Denial of Service condition. Additionally, the bundled\nversion of libtommath has an error in its prime number generation,\nwhich could result in the generation of weak keys. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dropbear users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/dropbear-2012.55\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-0920\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0920\n[ 2 ] libtommath Gentoo bug\n https://bugs.gentoo.org/show_bug.cgi?id=328383\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201309-20.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2012-0920" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "BID", "id": "52159" }, { "db": "VULMON", "id": "CVE-2012-0920" }, { "db": "PACKETSTORM", "id": "110196" }, { "db": "PACKETSTORM", "id": "112200" }, { "db": "PACKETSTORM", "id": "112139" }, { "db": "PACKETSTORM", "id": "110231" }, { "db": "PACKETSTORM", "id": "123412" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "52159", "trust": 3.2 }, { "db": "NVD", "id": "CVE-2012-0920", "trust": 3.1 }, { "db": "SECUNIA", "id": "48929", "trust": 1.8 }, { "db": "SECUNIA", "id": "48147", "trust": 1.8 }, { "db": "OSVDB", "id": "79590", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2012-002622", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-8994", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201202-482", "trust": 0.6 }, { "db": "XF", "id": "73444", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-2456", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201204-509", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2012-0920", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110196", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112200", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112139", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110231", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123412", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "VULMON", "id": "CVE-2012-0920" }, { "db": "BID", "id": "52159" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "PACKETSTORM", "id": "110196" }, { "db": "PACKETSTORM", "id": "112200" }, { "db": "PACKETSTORM", "id": "112139" }, { "db": "PACKETSTORM", "id": "110231" }, { "db": "PACKETSTORM", "id": "123412" }, { "db": "NVD", "id": "CVE-2012-0920" }, { "db": "CNNVD", "id": "CNNVD-201202-482" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "id": "VAR-201206-0202", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" } ] }, "last_update_date": "2023-12-18T13:34:52.704000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "2012.55 - Wednesday 22 February 2012", "trust": 0.8, "url": "http://matt.ucc.asn.au/dropbear/changes" }, { "title": "DSA-2456", "trust": 0.8, "url": "http://www.debian.org/security/2012/dsa-2456" }, { "title": "changeset 654:818108bf7749", "trust": 0.8, "url": "https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749" }, { "title": "Dropbear SSH Server Remote Code Execution Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/35362" }, { "title": "dropbear-2012.55", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=43282" }, { "title": "Debian CVElist Bug Report Logs: dropbear: CVE-2012-0920 SSH server use-after-free vulnerability]", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=cbf9a8c2d49e399ea612727921bec592" }, { "title": "Debian Security Advisories: DSA-2456-1 dropbear -- use after free", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2d04568c8a4cb30d3357629c0b5fb213" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=143b3fb255063c81571469eaa3cf0a87" }, { "title": "SAPReadyplayerSTOP", "trust": 0.1, "url": "https://github.com/thumbenail/sapreadyplayerstop " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "VULMON", "id": "CVE-2012-0920" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "NVD", "id": "CVE-2012-0920" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/52159" }, { "trust": 2.1, "url": "https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749" }, { "trust": 1.8, "url": "http://matt.ucc.asn.au/dropbear/changes" }, { "trust": 1.7, "url": "http://www.osvdb.org/79590" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48147" }, { "trust": 1.7, "url": "https://www.mantor.org/~northox/misc/cve-2012-0920.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48929" }, { "trust": 1.7, "url": "http://www.debian.org/security/2012/dsa-2456" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73444" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0920" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0920" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/52159/info" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/73444" }, { "trust": 0.3, "url": "http://matt.ucc.asn.au/dropbear/dropbear.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0920" }, { "trust": 0.2, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/399.html" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661150" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/thumbenail/sapreadyplayerstop" }, { "trust": 0.1, "url": "https://www.debian.org/security/./dsa-2456" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48929/#comments" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2012/dsa-2456" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48929" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48929/" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48147" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48147/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48147/" }, { "trust": 0.1, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-02/0404.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://bugs.gentoo.org/show_bug.cgi?id=328383" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201309-20.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0920" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "VULMON", "id": "CVE-2012-0920" }, { "db": "BID", "id": "52159" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "PACKETSTORM", "id": "110196" }, { "db": "PACKETSTORM", "id": "112200" }, { "db": "PACKETSTORM", "id": "112139" }, { "db": "PACKETSTORM", "id": "110231" }, { "db": "PACKETSTORM", "id": "123412" }, { "db": "NVD", "id": "CVE-2012-0920" }, { "db": "CNNVD", "id": "CNNVD-201202-482" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "VULMON", "id": "CVE-2012-0920" }, { "db": "BID", "id": "52159" }, { "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "db": "PACKETSTORM", "id": "110196" }, { "db": "PACKETSTORM", "id": "112200" }, { "db": "PACKETSTORM", "id": "112139" }, { "db": "PACKETSTORM", "id": "110231" }, { "db": "PACKETSTORM", "id": "123412" }, { "db": "NVD", "id": "CVE-2012-0920" }, { "db": "CNNVD", "id": "CNNVD-201202-482" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2012-8994" }, { "date": "2012-06-05T00:00:00", "db": "VULMON", "id": "CVE-2012-0920" }, { "date": "2012-02-24T00:00:00", "db": "BID", "id": "52159" }, { "date": "2012-06-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "date": "2012-02-24T23:34:19", "db": "PACKETSTORM", "id": "110196" }, { "date": "2012-04-26T01:55:20", "db": "PACKETSTORM", "id": "112200" }, { "date": "2012-04-25T02:07:18", "db": "PACKETSTORM", "id": "112139" }, { "date": "2012-02-27T04:35:02", "db": "PACKETSTORM", "id": "110231" }, { "date": "2013-09-27T04:59:49", "db": "PACKETSTORM", "id": "123412" }, { "date": "2012-06-05T22:55:09.437000", "db": "NVD", "id": "CVE-2012-0920" }, { "date": "2012-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-482" }, { "date": "2012-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2012-8994" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2012-0920" }, { "date": "2017-05-23T16:28:00", "db": "BID", "id": "52159" }, { "date": "2012-06-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002622" }, { "date": "2018-10-30T16:28:04.047000", "db": "NVD", "id": "CVE-2012-0920" }, { "date": "2012-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-482" }, { "date": "2012-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-509" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-482" }, { "db": "CNNVD", "id": "CNNVD-201204-509" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dropbear SSH Server Remote Code Execution Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2012-8994" }, { "db": "CNNVD", "id": "CNNVD-201202-482" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201204-509" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.