Vulnerability Details : CVE-2012-2385
The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
Vulnerability category: Denial of service
Products affected by CVE-2012-2385
- cpe:2.3:a:keith_winstein:mosh:*:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:0.98c:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.1.3-2:*:*:*:*:*:*:*
- cpe:2.3:a:keith_winstein:mosh:1.1.3-1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-2385
4.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2385
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2012-2385
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2385
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082766.html
[SECURITY] Fedora 15 Update: mosh-1.2.2-1.fc15
-
https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e
Cap escape sequence parameters to prevent long loops. · mobile-shell/mosh@9791768 · GitHubPatch
-
http://www.openwall.com/lists/oss-security/2012/05/22/9
oss-security - Re: CVE Request -- mosh (and probably vte too): mosh server DoS (long loop) due improper parsing of terminal parameters in terminal dispatcher
-
https://github.com/keithw/mosh/blob/master/ChangeLog
mosh/ChangeLog at master · mobile-shell/mosh · GitHub
-
https://github.com/keithw/mosh/issues/271
slow processing of escape sequences with large repeat counts · Issue #271 · mobile-shell/mosh · GitHub
-
https://bugzilla.redhat.com/show_bug.cgi?id=823943
823943 – (CVE-2012-2385) CVE-2012-2385 mosh: DoS (excessive CPU use) by processing short ANSI escape sequence
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082850.html
[SECURITY] Fedora 17 Update: mosh-1.2.2-1.fc17
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082814.html
[SECURITY] Fedora 16 Update: mosh-1.2.2-1.fc16
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75779
Mosh sequences denial of service CVE-2012-2385 Vulnerability Report
-
http://www.securityfocus.com/bid/53646
Mosh Remote Denial of Service Vulnerability
Jump to