CVE-2012-2385

mosh <1.2.1 - DoS

Title source: llm
STIX 2.1

Description

The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Timo Juhani Lindfors · textdoslinux
https://www.exploit-db.com/exploits/37306

References (11)

Core 11
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/49260
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082766.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082814.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082850.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/53646
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/05/22/9
Issue Tracking x_refsource_confirm
https://github.com/keithw/mosh/issues/271
Issue Tracking x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=823943
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/75779

Scores

EPSS 0.1213
EPSS Percentile 93.9%

Details

CWE
CWE-399
Status published
Products (10)
keith_winstein/mosh 0.98c
keith_winstein/mosh 1.0
keith_winstein/mosh 1.1
keith_winstein/mosh 1.1.1
keith_winstein/mosh 1.1.2
keith_winstein/mosh 1.1.3
keith_winstein/mosh 1.1.3-1
keith_winstein/mosh 1.1.3-2
keith_winstein/mosh 1.2
keith_winstein/mosh < 1.2-2
Published Jun 29, 2012
Tracked Since Feb 18, 2026