Computer Security
[EN] securityvulns.ru no-pyccku


SSH SFTP client / server format string vulnerability
Published:16.02.2006
Source:
SecurityVulns ID:5783
Type:client
Threat Level:
6/10
Description:Format string bug on filename logging.
Affected:SSH : SSH 3.2
 WRQ : WRQ Reflection for Secure IT UNIX Server 6.0
 F-SECURE : F-Secure SSH for Windows 5.0
 F-SECURE : F-Secure SSH for UNIX 5.0
 WRQ : WRQ Reflection for Secure IT Windows Server 6.0
 SSH : SSH Tectia Server 4.4
CVE:CVE-2006-0705 (Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command.)
Original documentdocumentSECUNIA, [SA18828] SSH Tectia Server SFTP Service Unspecified Vulnerability (16.02.2006)
 documentSECUNIA, [SA18843] WRQ Reflection Secure IT SFTP Format String Vulnerability (16.02.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod