CVE-2012-4559
Published: 20 November 2012
Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
Priority
Status
Package | Release | Status |
---|---|---|
libssh Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(0.4.2-1ubuntu1.1)
|
|
oneiric |
Released
(0.5.2-1ubuntu0.11.10.1)
|
|
precise |
Released
(0.5.2-1ubuntu0.12.04.1)
|
|
quantal |
Released
(0.5.2-1ubuntu0.12.10.1)
|
|
upstream |
Released
(0.5.3-1)
|
|
Patches: upstream: http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=4d8420f3282ed07fc99fc5e930c17df27ef1e9b2 upstream: http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=1471f2c67a23602898e783c97b65aea9cc6356a4 upstream: http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=6236001ff4f9017c9f842d6548baba9760c95f5c upstream: http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=46b2eb3c147a29478809f1ab95e924e1bb7e3768 |