Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution

High Nessus Plugin ID 58183


The remote host is affected by a remote code execution vulnerability.


According to its self-reported banner, the remote host is running a version of Dropbear SSH before 2012.55. As such, it reportedly contains a flaw that might allow an attacker to run arbitrary code on the remote host with root privileges if they are authenticated using a public key and command restriction is enforced.

Note that Nessus has not tried to exploit this vulnerability but instead has relied solely on the version in the service's banner.

Note also, in cases where the host is running ESXi 4.0 or ESXi 4.1, VMware states in their KB article id 2037316 that this is a false positive since administrative access is required to login via SSH so there are no privileges to be gained by exploiting this issue. That is true only in a default setup, not one in which SSH access has been enabled for non-root users.


Upgrade to the Dropbear SSH 2012.55 or later.

See Also





Plugin Details

Severity: High

ID: 58183

File Name: dropbear_ssh_55.nasl

Version: $Revision: 1.6 $

Type: remote

Family: Misc.

Published: 2012/03/01

Modified: 2017/05/16

Dependencies: 10267

Risk Information

Risk Factor: High


Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:matt_johnston:dropbear_ssh_server

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/02/24

Vulnerability Publication Date: 2012/02/24

Reference Information

CVE: CVE-2012-0920

BID: 52159

OSVDB: 79590