Debian DSA-2456-1 : dropbear - use after free

high Nessus Plugin ID 58853

Synopsis

The remote Debian host is missing a security-related update.

Description

Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code.
Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place.

Solution

Upgrade the dropbear packages.

For the stable distribution (squeeze), this problem has been fixed in version 0.52-5+squeeze1.

See Also

https://packages.debian.org/source/squeeze/dropbear

https://www.debian.org/security/2012/dsa-2456

Plugin Details

Severity: High

ID: 58853

File Name: debian_DSA-2456.nasl

Version: 1.11

Type: local

Agent: unix

Published: 4/25/2012

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:dropbear, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 4/23/2012

Reference Information

CVE: CVE-2012-0920

BID: 52159

DSA: 2456