DEBIAN-CVE-2005-4178

Source
https://security-tracker.debian.org/tracker/CVE-2005-4178
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-4178.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2005-4178
Upstream
Published
2005-12-12T21:03:00Z
Modified
2025-11-19T02:04:42.263218Z
Summary
[none]
Details

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.

References

Affected packages

Debian:11 / dropbear

Package

Name
dropbear
Purl
pkg:deb/debian/dropbear?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.47-1

Ecosystem specific

{
    "urgency": "high"
}

Debian:12 / dropbear

Package

Name
dropbear
Purl
pkg:deb/debian/dropbear?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.47-1

Ecosystem specific

{
    "urgency": "high"
}

Debian:13 / dropbear

Package

Name
dropbear
Purl
pkg:deb/debian/dropbear?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.47-1

Ecosystem specific

{
    "urgency": "high"
}

Debian:14 / dropbear

Package

Name
dropbear
Purl
pkg:deb/debian/dropbear?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.47-1

Ecosystem specific

{
    "urgency": "high"
}