Lucene search

K

Dropbear Ssh Security Vulnerabilities

cve
cve

CVE-2004-2486

The DSS verification code in Dropbear SSH Server before 0.43 frees uninitialized variables, which might allow remote attackers to gain access.

6.9AI Score

0.027EPSS

2005-10-25 04:00 AM
27
cve
cve

CVE-2005-4178

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.

7.3AI Score

0.003EPSS

2005-12-12 09:03 PM
37
cve
cve

CVE-2006-1206

Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined val...

6.5AI Score

0.027EPSS

2006-03-14 01:06 AM
26
cve
cve

CVE-2007-1099

dbclient in Dropbear SSH client before 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote attackers to conduct man-in-the-middle attacks.

6.4AI Score

0.01EPSS

2007-02-26 05:28 PM
35
cve
cve

CVE-2012-0920

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concu...

9.3AI Score

0.01EPSS

2012-06-05 10:55 PM
67
cve
cve

CVE-2013-4421

The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.

6.3AI Score

0.07EPSS

2013-10-25 11:55 PM
38
cve
cve

CVE-2013-4434

Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.

6.5AI Score

0.021EPSS

2013-10-25 11:55 PM
35
cve
cve

CVE-2016-3116

CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.

6.4CVSS

5.9AI Score

0.028EPSS

2016-03-22 10:59 AM
92
cve
cve

CVE-2016-7406

Format string vulnerability in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.

9.8CVSS

9.6AI Score

0.029EPSS

2017-03-03 04:59 PM
198
2
cve
cve

CVE-2016-7407

The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.

9.8CVSS

9.4AI Score

0.01EPSS

2017-03-03 04:59 PM
121
cve
cve

CVE-2016-7408

The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.

8.8CVSS

9.2AI Score

0.009EPSS

2017-03-03 04:59 PM
52
cve
cve

CVE-2016-7409

The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.

5.5CVSS

6.7AI Score

0.0004EPSS

2017-03-03 04:59 PM
48
cve
cve

CVE-2017-2659

It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.

7.5CVSS

7.8AI Score

0.001EPSS

2019-03-21 03:59 PM
32
cve
cve

CVE-2017-9078

The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.

8.8CVSS

8.6AI Score

0.005EPSS

2017-05-19 02:29 PM
170
2
cve
cve

CVE-2017-9079

Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.

4.7CVSS

5.6AI Score

0.0004EPSS

2017-05-19 02:29 PM
79
cve
cve

CVE-2018-15599

The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.

5.3CVSS

5.8AI Score

0.024EPSS

2018-08-21 01:29 AM
99
cve
cve

CVE-2019-12953

Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.

5.3CVSS

5AI Score

0.003EPSS

2020-12-30 08:15 PM
113
cve
cve

CVE-2020-36254

scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.

8.1CVSS

6.3AI Score

0.005EPSS

2021-02-25 09:15 AM
93
2
cve
cve

CVE-2021-36369

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tok...

7.5CVSS

7.4AI Score

0.001EPSS

2022-10-12 09:15 PM
100
14
cve
cve

CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connecti...

5.9CVSS

6.7AI Score

0.963EPSS

2023-12-18 04:15 PM
481