CVE-2005-4178
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/12/2005
Last modified:
03/04/2025
Description
Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:* | 0.47 (excluding) | |
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2005q4/000312.html
- http://matt.ucc.asn.au/dropbear/dropbear.html
- http://secunia.com/advisories/18108
- http://secunia.com/advisories/18109
- http://secunia.com/advisories/18142
- http://www.debian.org/security/2005/dsa-923
- http://www.gentoo.org/security/en/glsa/glsa-200512-13.xml
- http://www.securityfocus.com/bid/15923/
- http://www.vupen.com/english/advisories/2005/2962
- http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2005q4/000312.html
- http://matt.ucc.asn.au/dropbear/dropbear.html
- http://secunia.com/advisories/18108
- http://secunia.com/advisories/18109
- http://secunia.com/advisories/18142
- http://www.debian.org/security/2005/dsa-923
- http://www.gentoo.org/security/en/glsa/glsa-200512-13.xml
- http://www.securityfocus.com/bid/15923/
- http://www.vupen.com/english/advisories/2005/2962