High severity8.8NVD Advisory· Published May 19, 2017· Updated May 13, 2026
CVE-2017-9078
CVE-2017-9078
Description
The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.
Affected products
3- cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*Range: <2017.75
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.htmlnvdMailing ListPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3859nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20191004-0006/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.