First published: Mon Dec 12 2005(Updated: )
Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbear Ssh Project Dropbear Ssh | <0.47 | |
Debian Debian Linux | =3.1 | |
Debian Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.