The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201702-23 | patch vendor advisory third party advisory vdb entry |
https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e | patch third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2016/09/15/2 | patch mailing list third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1376353 | issue tracking |
http://www.securityfocus.com/bid/92972 | third party advisory vdb entry |