CVE-2012-0920

EUVD-2012-0943
Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:S/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
Affected Products (NVD)
VendorProductVersion
dropbear_ssh_projectdropbear_ssh
0.52 ≤
𝑥
≤ 2012.54
debiandebian_linux
6.0
debiandebian_linux
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dropbear
bookworm
2022.83-1+deb12u2
fixed
bullseye
2020.81-3+deb11u2
fixed
sid
2024.86-1
fixed
trixie
2024.86-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dropbear
hardy
ignored
lucid
Fixed 0.52-4ubuntu0.10.04.1
released
natty
Fixed 0.52-5+squeeze1build0.11.04.1
released
oneiric
Fixed 0.53.1-1ubuntu1.1
released
precise
Fixed 2011.54-1ubuntu0.12.04.1
released
Common Weakness Enumeration