Korean
<< Back
VID 12087
Severity 40
Port 22
Protocol TCP
Class SSH
Detailed Description The freeSSHd SSH server is vulnerable to a buffer overflow vulnerability via a long key exchange algorithm string. freeSSHd is a freely available SSH server for Microsoft Windows platforms. freeSSHd versions 1.0.9 and earlier and wodSSHServer ActiveX Component versions 1.2.7 and 1.3.3 and earlier are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking of key exchange algorithm strings. A remote attacker could exploit this vulnerability to cause the SSH server to crash or execute arbitrary code on the affected system.

* References:
http://www.securityfocus.com/archive/1/archive/1/434415/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/434402/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/434038/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/434007/100/0/threaded
http://www.kb.cert.org/vuls/id/477960
http://secunia.com/advisories/19845
http://secunia.com/advisories/19846
http://secunia.com/advisories/20136
http://www.frsirt.com/english/advisories/2006/1785
http://www.frsirt.com/english/advisories/2006/1786
http://www.frsirt.com/english/advisories/2006/1842

* Platforms Affected:
WeOnlyDo Software, wodSSHServer ActiveX Component versions 1.2.7 and earlier
WeOnlyDo Software, wodSSHServer ActiveX Component versions 1.3.3 and earlier
freeSSHd development team, freeSSHd versions 1.0.9 and earlier
Microsoft Windows Any version
Recommendation For freeSSHd:
Upgrade to the latest version of freeSSHd (1.0.10 or later), available from the freeSSHd Web site at http://freesshd.com/?ctt=download

For wodSSHServer ActiveX Component:
Upgrade to the latest version of wodSSHServer ActiveX Component (1.3.4 or later), available from the WeOnlyDo Software Web site at http://www.weonlydo.com/index.asp?showform=SSHServer
Related URL CVE-2006-2407 (CVE)
Related URL 17958 (SecurityFocus)
Related URL 26442 (ISS)