VID |
12087 |
Severity |
40 |
Port |
22 |
Protocol |
TCP |
Class |
SSH |
Detailed Description |
The freeSSHd SSH server is vulnerable to a buffer overflow vulnerability via a long key exchange algorithm string. freeSSHd is a freely available SSH server for Microsoft Windows platforms. freeSSHd versions 1.0.9 and earlier and wodSSHServer ActiveX Component versions 1.2.7 and 1.3.3 and earlier are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking of key exchange algorithm strings. A remote attacker could exploit this vulnerability to cause the SSH server to crash or execute arbitrary code on the affected system.
* References: http://www.securityfocus.com/archive/1/archive/1/434415/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/434402/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/434038/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/434007/100/0/threaded http://www.kb.cert.org/vuls/id/477960 http://secunia.com/advisories/19845 http://secunia.com/advisories/19846 http://secunia.com/advisories/20136 http://www.frsirt.com/english/advisories/2006/1785 http://www.frsirt.com/english/advisories/2006/1786 http://www.frsirt.com/english/advisories/2006/1842
* Platforms Affected: WeOnlyDo Software, wodSSHServer ActiveX Component versions 1.2.7 and earlier WeOnlyDo Software, wodSSHServer ActiveX Component versions 1.3.3 and earlier freeSSHd development team, freeSSHd versions 1.0.9 and earlier Microsoft Windows Any version |
Recommendation |
For freeSSHd: Upgrade to the latest version of freeSSHd (1.0.10 or later), available from the freeSSHd Web site at http://freesshd.com/?ctt=download
For wodSSHServer ActiveX Component: Upgrade to the latest version of wodSSHServer ActiveX Component (1.3.4 or later), available from the WeOnlyDo Software Web site at http://www.weonlydo.com/index.asp?showform=SSHServer |
Related URL |
CVE-2006-2407 (CVE) |
Related URL |
17958 (SecurityFocus) |
Related URL |
26442 (ISS) |
|