JVN Info.
- Id
- 42973
- Name
- JVNDB-2009-003980
- Title
- Trac における詳細不明な脆弱性
- Summary
- Trac には、詳細不明な脆弱性が存在します。
- Nvdinfo
- CVE-2009-4405
- Cvssv2
- 7.5
- Jvnurl
- http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-003980.html
- Published Date
- 2009-12-23
- Registered Date
- 2012-06-26
- Last Updated Date
- 2012-06-26
Related Nessuslogs
Id | Log ID | Jvninfo Id | Plugin ID | CVE | CVSS | Risk | Host | Protocol | Port | Name | Synopsis | Description | Solution | See Also | Plugin Output | Actions |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
51950 | H28_MUN_DWEB_Q4_172_16_240_seg.csv | 42973 | 58183 | CVE-2012-0920 | 7.1 | High | 172.16.240.131 | tcp | 22 | Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution | The remote host is affected by a remote code execution vulnerability. | According to its self-reported banner, the remote host is running a version of Dropbear SSH before 2012.55. As such, it reportedly contains a flaw that might allow an attacker to run arbitrary code on the remote host with root privileges if they are authenticated using a public key and command restriction is enforced. Note that Nessus has not tried to exploit this vulnerability but instead has relied solely on the version in the service"s banner. Note also, in cases where the host is running ESXi 4.0 or ESXi 4.1, VMware states in their KB article id 2037316 that this is a false positive since administrative access is required to login via SSH so there are no privileges to be gained by exploiting this issue. That is true only in a default setup, not one in which SSH access has been enabled for non-root users. | Upgrade to the Dropbear SSH 2012.55 or later. | https://matt.ucc.asn.au/dropbear/CHANGES https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749 https://www.mantor.org/~northox/misc/CVE-2012-0920.html http://kb.vmware.com/kb/2037316 | Version source : SSH-2.0-dropbear_0.52 Installed version : 0.52 Fixed version : 2012.55 | |
57526 | H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv | 42973 | 58183 | CVE-2012-0920 | 7.1 | High | 172.16.240.131 | tcp | 22 | Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution | The remote host is affected by a remote code execution vulnerability. | According to its self-reported banner, the remote host is running a version of Dropbear SSH before 2012.55. As such, it reportedly contains a flaw that might allow an attacker to run arbitrary code on the remote host with root privileges if they are authenticated using a public key and command restriction is enforced. Note that Nessus has not tried to exploit this vulnerability but instead has relied solely on the version in the service"s banner. Note also, in cases where the host is running ESXi 4.0 or ESXi 4.1, VMware states in their KB article id 2037316 that this is a false positive since administrative access is required to login via SSH so there are no privileges to be gained by exploiting this issue. That is true only in a default setup, not one in which SSH access has been enabled for non-root users. | Upgrade to the Dropbear SSH 2012.55 or later. | https://matt.ucc.asn.au/dropbear/CHANGES https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749 https://www.mantor.org/~northox/misc/CVE-2012-0920.html http://kb.vmware.com/kb/2037316 | Version source : SSH-2.0-dropbear_0.52 Installed version : 0.52 Fixed version : 2012.55 |