Search for vulnerabilities
Vulnerability details: VCID-4veb-v2vm-aaac
Vulnerability ID VCID-4veb-v2vm-aaac
Aliases CVE-2012-6063
Summary Double free vulnerability in the sftp_mkdir function in sftp.c in libssh before 0.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vector than CVE-2012-4559.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.02138 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.03980 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.03980 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.05721 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
epss 0.06892 https://api.first.org/data/v1/epss?cve=CVE-2012-6063
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2012-6063
Reference id Reference type URL
http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=4d8420f3282ed07fc99fc5e930c17df27ef1e9b2
https://api.first.org/data/v1/epss?cve=CVE-2012-6063
https://bugzilla.redhat.com/show_bug.cgi?id=871612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6063
http://www.debian.org/security/2012/dsa-2577
http://www.libssh.org/2012/11/20/libssh-0-5-3-security-release/
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.1:*:*:*:*:*:*:*
CVE-2012-6063 https://nvd.nist.gov/vuln/detail/CVE-2012-6063
GLSA-201402-26 https://security.gentoo.org/glsa/201402-26
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2012-6063
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.82656
EPSS Score 0.02138
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.