CVE-2012-0920

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:S/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
dropbear_ssh_projectdropbear_ssh
0.52 ≤
𝑥
≤ 2012.54
debiandebian_linux
6.0
debiandebian_linux
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dropbear
bullseye
2020.81-3+deb11u2
fixed
bookworm
2022.83-1+deb12u2
fixed
sid
2024.86-1
fixed
trixie
2024.86-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dropbear
precise
Fixed 2011.54-1ubuntu0.12.04.1
released
oneiric
Fixed 0.53.1-1ubuntu1.1
released
natty
Fixed 0.52-5+squeeze1build0.11.04.1
released
lucid
Fixed 0.52-4ubuntu0.10.04.1
released
hardy
ignored
Common Weakness Enumeration