CVE-2012-4560
Published: 20 November 2012
Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
Priority
Status
Package | Release | Status |
---|---|---|
libssh Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Not vulnerable
(code is different)
|
|
oneiric |
Released
(0.5.2-1ubuntu0.11.10.1)
|
|
precise |
Released
(0.5.2-1ubuntu0.12.04.1)
|
|
quantal |
Released
(0.5.2-1ubuntu0.12.10.1)
|
|
upstream |
Released
(0.5.3-1)
|
|
Patches: upstream: http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=64fca8a7ed83c3315781a77aac1ea36d52ff0c7e upstream: http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=b485463197cd220aa654e7fc34a18d68af37e6e7 |