ALT-PU-2016-1786-1
Closed vulnerabilities
BDU:2017-02586
Уязвимость пакета программ для организации сеансов связи по протоколу SSH Dropbear, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2017-02587
Уязвимость пакета программ для организации сеансов связи по протоколу SSH Dropbear, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2016-7406
Format string vulnerability in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- 92974
- 92974
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb
- https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb
- GLSA-201702-23
- GLSA-201702-23
Modified: 2024-11-21
CVE-2016-7407
The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- 92972
- 92972
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e
- https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e
- GLSA-201702-23
- GLSA-201702-23
Modified: 2024-11-21
CVE-2016-7408
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- 92970
- 92970
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6
- https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6
- GLSA-201702-23
- GLSA-201702-23
Modified: 2024-11-21
CVE-2016-7409
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- [oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74
- 92973
- 92973
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://bugzilla.redhat.com/show_bug.cgi?id=1376353
- https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
- https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
- GLSA-201702-23
- GLSA-201702-23