VID |
14045 |
Severity |
40 |
Port |
22 |
Protocol |
TCP |
Class |
SSH |
Detailed Description |
The FortressSSH server, according to its banner, has a buffer overflow vulnerability via long SSH_MSG_KEXINIT messages. FortressSSH is a SSH server for Microsoft Windows platforms. FortressSSH version 4.0.7.20 and earlier versions are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking when logging the contents in SSH_MSG_KEXINIT messages sent by an SSH client. A remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.
* Note: This check solely relied on the banner of the remote SSH server to assess this vulnerability, so this might be a false positive.
* References: http://www.frsirt.com/english/advisories/2006/1820 http://secunia.com/advisories/20114/
* Platforms Affected: Microsoft Windows Any version Pragma Systems, Inc., FortressSSH version 4.0.7.20 and earlier versions |
Recommendation |
No upgrade or patch available as of June 2006. Restrict access to trusted IP addresses only. |
Related URL |
CVE-2006-2421 (CVE) |
Related URL |
17991 (SecurityFocus) |
Related URL |
26498 (ISS) |
|