Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hw56-hwpj-4432

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

EPSS

Процентиль: 82%
0.01803
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

nvd
больше 13 лет назад

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency."

debian
больше 13 лет назад

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012. ...

fstec
больше 12 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 82%
0.01803
Низкий