Vulnerability CVE-2013-4421


Published: 2013-10-25   Modified: 2013-10-26

Description:
The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.

Type:

CWE-189

(Numeric Errors)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Matt johnston -> Dropbear ssh server 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119300.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119323.html
http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html
http://lists.opensuse.org/opensuse-updates/2013-11/msg00046.html
http://www.openwall.com/lists/oss-security/2013/10/11/4
http://www.securityfocus.com/bid/62958
https://matt.ucc.asn.au/dropbear/CHANGES
https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f
https://support.citrix.com/article/CTX216642

Copyright 2024, cxsecurity.com

 

Back to Top