CVE-2013-4421SSH Project Dropbear SSH vulnerability

CWE-1895 documents5 sources
Severity
5.0MEDIUMNVD
EPSS
25.9%
top 3.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 25
Latest updateMay 14

Description

The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/dropbear< dropbear 2012.55-1.4 (bookworm)
Debiandropbear_ssh_project/dropbear_ssh< 2012.55-1.4+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v8r9-3c3f-g75m: The buf_decompress function in packet2022-05-14
OSV
CVE-2013-4421: The buf_decompress function in packet2013-10-25

📋Vendor Advisories

1
Debian
CVE-2013-4421: dropbear - The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 al...2013

💬Community

1
Bugzilla
CVE-2013-4421 dropbear: memory exhaustion DoS via large decompressed payloads2013-10-10