CVE-2005-4178Improper Restriction of Operations within the Bounds of a Memory Buffer in SSH Project Dropbear SSH

4 documents4 sources
Severity
6.5MEDIUMNVD
EPSS
1.7%
top 17.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12
Latest updateMay 1

Description

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/dropbear< dropbear 0.47-1 (bookworm)

Also affects: Debian Linux 3.0, 3.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6483-gg6m-x7w8: Buffer overflow in Dropbear server before 02022-05-01
OSV
CVE-2005-4178: Buffer overflow in Dropbear server before 02005-12-12

📋Vendor Advisories

1
Debian
CVE-2005-4178: dropbear - Buffer overflow in Dropbear server before 0.47 allows authenticated users to exe...2005