Vulnerabilities > CVE-2002-1059 - Unspecified vulnerability in VAN Dyke Technologies Securecrt
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
Vulnerable Configurations
Exploit-Db
description SecureCRT 2.4/3.x/4.0 SSH1 Identifier String Buffer Overflow Vulnerability (1). CVE-2002-1059. Dos exploit for windows platform id EDB-ID:21634 last seen 2016-02-02 modified 2002-07-23 published 2002-07-23 reporter Kyuzo source https://www.exploit-db.com/download/21634/ title SecureCRT 2.4/3.x/4.0 SSH1 Identifier String Buffer Overflow Vulnerability 1 description SecureCRT. CVE-2002-1059. Remote exploit for windows platform id EDB-ID:16460 last seen 2016-02-01 modified 2010-04-30 published 2010-04-30 reporter metasploit source https://www.exploit-db.com/download/16460/ title SecureCRT <= 4.0 Beta 2 SSH1 - Buffer Overflow description SecureCRT 2.4/3.x/4.0 SSH1 Identifier String Buffer Overflow Vulnerability (2). CVE-2002-1059. Remote exploit for windows platform id EDB-ID:21635 last seen 2016-02-02 modified 2002-07-23 published 2002-07-23 reporter andrea lisci source https://www.exploit-db.com/download/21635/ title SecureCRT 2.4/3.x/4.0 SSH1 Identifier String Buffer Overflow Vulnerability 2
Metasploit
description | This module exploits a buffer overflow in SecureCRT <= 4.0 Beta 2. By sending a vulnerable client an overly long SSH1 protocol identifier string, it is possible to execute arbitrary code. This module has only been tested on SecureCRT 3.4.4. |
id | MSF:EXPLOIT/WINDOWS/SSH/SECURECRT_SSH1 |
last seen | 2020-05-22 |
modified | 2017-07-24 |
published | 2006-12-14 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1059 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/ssh/securecrt_ssh1.rb |
title | SecureCRT SSH1 Buffer Overflow |
Nessus
NASL family | Windows |
NASL id | SECURECRT_REMOTE_OVERFLOW.NASL |
description | The remote host is using a vulnerable version of SecureCRT, a SSH/Telnet client built for Microsoft Windows operating systems. It has been reported that SecureCRT contains a remote buffer overflow allowing an SSH server to execute arbitrary commands via an especially long SSH1 protocol version string. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15822 |
published | 2004-11-24 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15822 |
title | SecureCRT SSH-1 Protocol Version String Remote Overflow |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/82992/securecrt_ssh1.rb.txt |
id | PACKETSTORM:82992 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/82992/SecureCRT-4.0-Beta-2-SSH1-Buffer-Overflow.html |
title | SecureCRT <= 4.0 Beta 2 SSH1 Buffer Overflow |
References
- http://marc.info/?l=bugtraq&m=102744150718462&w=2
- http://marc.info/?l=bugtraq&m=102744150718462&w=2
- http://marc.info/?l=bugtraq&m=102746007908689&w=2
- http://marc.info/?l=bugtraq&m=102746007908689&w=2
- http://www.iss.net/security_center/static/9650.php
- http://www.iss.net/security_center/static/9650.php
- http://www.osvdb.org/4991
- http://www.osvdb.org/4991
- http://www.securityfocus.com/bid/5287
- http://www.securityfocus.com/bid/5287
- http://www.vandyke.com/products/securecrt/security07-25-02.html
- http://www.vandyke.com/products/securecrt/security07-25-02.html