Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200512-13 ] Dropbear: Privilege escalation
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Veteran
Veteran


Joined: 12 May 2004
Posts: 1571

PostPosted: Fri Dec 23, 2005 12:26 pm    Post subject: [ GLSA 200512-13 ] Dropbear: Privilege escalation Reply with quote

Gentoo Linux Security Advisory

Title: Dropbear: Privilege escalation (GLSA 200512-13)
Severity: high
Exploitable: remote
Date: December 23, 2005
Bug(s): #116006
ID: 200512-13

Synopsis

A buffer overflow in Dropbear could allow authenticated users to execute arbitrary code as the root user.

Background

Dropbear is an SSH server and client with a small memory footprint.

Affected Packages

Package: net-misc/dropbear
Vulnerable: < 0.47
Unaffected: >= 0.47
Architectures: All supported architectures


Description

Under certain conditions Dropbear could fail to allocate a sufficient amount of memory, possibly resulting in a buffer overflow.

Impact

By sending specially crafted data to the server, authenticated users could exploit this vulnerability to execute arbitrary code with the permissions of the SSH server user, which is the root user by default.

Workaround

There is no known workaround at this time.

Resolution

All Dropbear users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/dropbear-0.47"


References

CVE-2005-4178


Last edited by GLSA on Sun May 07, 2006 4:59 pm; edited 1 time in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum