Download
| Alert*
oval:org.secpod.oval:def:1800169
CVE-2017-9078 - The server in Dropbear before 2017.75 might allow post-authenticationroot remote code execution because of a double free in cleanup of TCPlisteners when the -a option is enabled. CVE-2017-9079 - Dropbear before 2017.75 might allow local users to read certain files as root, if the fil ... oval:org.secpod.oval:def:112435 Dropbear is a relatively small SSH server and client. Its particularly useful for embedded-type Linux systems, such as wireless routers. oval:org.secpod.oval:def:1900363 The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled. oval:org.secpod.oval:def:602894 Two vulnerabilities were found in Dropbear, a lightweight SSH2 server and client: CVE-2017-9078 Mark Shepard discovered a double free in the TCP listener cleanup which could result in denial of service by an authenticated user if Dropbear is running with the "-a" option. CVE-2017-9079 Jann ... oval:org.secpod.oval:def:1800622 CVE-2017-9078 - The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCPlisteners when the -a option is enabled. CVE-2017-9079 - Dropbear before 2017.75 might allow local users to read certain files as root, if the fi ... oval:org.secpod.oval:def:1800435 CVE-2017-9078 - The server in Dropbear before 2017.75 might allow post-authenticationroot remote code execution because of a double free in cleanup of TCPlisteners when the -a option is enabled. CVE-2017-9079 - Dropbear before 2017.75 might allow local users to read certain files as root, if the fil ... oval:org.secpod.oval:def:112432 Dropbear is a relatively small SSH server and client. Its particularly useful for embedded-type Linux systems, such as wireless routers. |