Mandriva Linux Security Advisory : mosh (MDVSA-2013:104)

Medium Nessus Plugin ID 66116


The remote Mandriva Linux host is missing a security update.


Updated mosh package fixes security vulnerability :

Mosh versions 1.2 and earlier allow an application to cause the mosh-server to consume large amounts of CPU time with a short ANSI escape sequence. In addition, a malicious mosh-server can cause the mosh-client to consume large amounts of CPU time with a short ANSI escape sequence. This arises because there was no limit on the value of the repeat parameter in some ANSI escape sequences, so even large and nonsensical values would be interpreted by Mosh's terminal emulator (CVE-2012-2385).


Update the affected mosh package.

Plugin Details

Severity: Medium

ID: 66116

File Name: mandriva_MDVSA-2013-104.nasl

Version: $Revision: 1.4 $

Type: local

Published: 2013/04/20

Modified: 2016/05/17

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4

Temporal Score: 3.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:mosh, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/04/10

Reference Information

CVE: CVE-2012-2385

BID: 53646

MDVSA: 2013:104

MGASA: 2012-0182