Security Advisories (3)
Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow. Net::DropbearĀ embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.
In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
- https://github.com/libtom/libtomcrypt/pull/508
- https://github.com/libtom/libtomcrypt/issues/507
- https://vuldb.com/?id.142995
- https://lists.debian.org/debian-lts-announce/2019/10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html
Module Install Instructions
To install Net::Dropbear, copy and paste the appropriate command in to your terminal.
cpanm Net::Dropbear
perl -MCPAN -e shell
install Net::Dropbear
For more information on module installation, please visit the detailed CPAN module installation guide.