Vulnerabilities > CVE-2005-4178

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
dropbear-ssh-project
debian
nessus

Summary

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200512-13.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200512-13 (Dropbear: Privilege escalation) Under certain conditions Dropbear could fail to allocate a sufficient amount of memory, possibly resulting in a buffer overflow. Impact : By sending specially crafted data to the server, authenticated users could exploit this vulnerability to execute arbitrary code with the permissions of the SSH server user, which is the root user by default. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id20354
    published2005-12-30
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20354
    titleGLSA-200512-13 : Dropbear: Privilege escalation
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-923.NASL
    descriptionA buffer overflow has been discovered in dropbear, a lightweight SSH2 server and client, that may allow authenticated users to execute arbitrary code as the server user (usually root).
    last seen2020-06-01
    modified2020-06-02
    plugin id22789
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22789
    titleDebian DSA-923-1 : dropbear - buffer overflow
  • NASL familyMisc.
    NASL idDROPBEAR_SSH_0_47.NASL
    descriptionAccording to its banner, the remote host is runnning a version of Dropbear SSH before 0.47. Such versions contain a buffer allocation error that may allow an authenticated user to gain elevated privileges.
    last seen2020-06-01
    modified2020-06-02
    plugin id34769
    published2008-11-13
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/34769
    titleDropbear SSH Server svr_ses.childpidsize Remote Overflow