Vulnerabilities > CVE-2006-2421 - Unspecified vulnerability in Pragma Systems Fortressssh
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN pragma-systems
nessus
Summary
Stack-based buffer overflow in Pragma FortressSSH 4.0.7.20 allows remote attackers to execute arbitrary code via long SSH_MSG_KEXINIT messages, which may cause an overflow when being logged. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Misc. |
NASL id | FORTRESSSSH_SSH_MSG_KEXINIT_OVERFLOW.NASL |
description | The remote host is running FortressSSH, an enterprise-class SSH server for Windows. According to its banner, the installed version of this software reportedly contains a buffer overflow vulnerability involving a boundary error in the logging of contents of |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21589 |
published | 2006-05-23 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21589 |
title | FortressSSH SSH_MSG_KEXINIT Logging Remote Overflow |