Search for vulnerabilities
Vulnerability ID | VCID-e3hh-uv6r-aaaa |
Aliases |
CVE-2012-0920
|
Summary | Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency." |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 6.4 |
Risk | 3.2 |
Affected and Fixed Packages | Package Details |
CWE-399 | Resource Management Errors |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.84305 |
EPSS Score | 0.01032 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |