The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dropbear_ssh | Dropbear_ssh_project | * | 2013.59 (excluding) |
Dropbear | Ubuntu | artful | * |
Dropbear | Ubuntu | lucid | * |
Dropbear | Ubuntu | precise | * |
Dropbear | Ubuntu | quantal | * |
Dropbear | Ubuntu | raring | * |
Dropbear | Ubuntu | saucy | * |
Dropbear | Ubuntu | utopic | * |
Dropbear | Ubuntu | vivid | * |
Dropbear | Ubuntu | wily | * |
Dropbear | Ubuntu | yakkety | * |
Dropbear | Ubuntu | zesty | * |