| VID |
12087 |
| Severity |
40 |
| Port |
22 |
| Protocol |
TCP |
| Class |
SSH |
| Detailed Description |
The freeSSHd SSH server is vulnerable to a buffer overflow vulnerability via a long key exchange algorithm string. freeSSHd is a freely available SSH server for Microsoft Windows platforms. freeSSHd versions 1.0.9 and earlier and wodSSHServer ActiveX Component versions 1.2.7 and 1.3.3 and earlier are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking of key exchange algorithm strings. A remote attacker could exploit this vulnerability to cause the SSH server to crash or execute arbitrary code on the affected system.
* References: http://www.securityfocus.com/archive/1/archive/1/434415/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/434402/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/434038/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/434007/100/0/threaded http://www.kb.cert.org/vuls/id/477960 http://secunia.com/advisories/19845 http://secunia.com/advisories/19846 http://secunia.com/advisories/20136 http://www.frsirt.com/english/advisories/2006/1785 http://www.frsirt.com/english/advisories/2006/1786 http://www.frsirt.com/english/advisories/2006/1842
* Platforms Affected: WeOnlyDo Software, wodSSHServer ActiveX Component versions 1.2.7 and earlier WeOnlyDo Software, wodSSHServer ActiveX Component versions 1.3.3 and earlier freeSSHd development team, freeSSHd versions 1.0.9 and earlier Microsoft Windows Any version |
| Recommendation |
For freeSSHd: Upgrade to the latest version of freeSSHd (1.0.10 or later), available from the freeSSHd Web site at http://freesshd.com/?ctt=download
For wodSSHServer ActiveX Component: Upgrade to the latest version of wodSSHServer ActiveX Component (1.3.4 or later), available from the WeOnlyDo Software Web site at http://www.weonlydo.com/index.asp?showform=SSHServer |
| Related URL |
CVE-2006-2407 (CVE) |
| Related URL |
17958 (SecurityFocus) |
| Related URL |
26442 (ISS) |
|