Korean
<< Back
VID 14045
Severity 40
Port 22
Protocol TCP
Class SSH
Detailed Description The FortressSSH server, according to its banner, has a buffer overflow vulnerability via long SSH_MSG_KEXINIT messages. FortressSSH is a SSH server for Microsoft Windows platforms. FortressSSH version 4.0.7.20 and earlier versions are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking when logging the contents in SSH_MSG_KEXINIT messages sent by an SSH client. A remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.

* Note: This check solely relied on the banner of the remote SSH server to assess this vulnerability, so this might be a false positive.

* References:
http://www.frsirt.com/english/advisories/2006/1820
http://secunia.com/advisories/20114/

* Platforms Affected:
Microsoft Windows Any version
Pragma Systems, Inc., FortressSSH version 4.0.7.20 and earlier versions
Recommendation No upgrade or patch available as of June 2006. Restrict access to trusted IP addresses only.
Related URL CVE-2006-2421 (CVE)
Related URL 17991 (SecurityFocus)
Related URL 26498 (ISS)