![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2005-4178 |
Description: | Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.56051 1.3.6.1.4.1.25623.1.0.56070 1.3.6.1.4.1.25623.1.0.105117 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-4178 BugTraq ID: 15923 http://www.securityfocus.com/bid/15923/ Debian Security Information: DSA-923 (Google Search) http://www.debian.org/security/2005/dsa-923 http://www.gentoo.org/security/en/glsa/glsa-200512-13.xml http://matt.ucc.asn.au/dropbear/dropbear.html http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2005q4/000312.html http://secunia.com/advisories/18108 http://secunia.com/advisories/18109 http://secunia.com/advisories/18142 http://www.vupen.com/english/advisories/2005/2962 |