vendor:
Axessh
by:
Uday Mittal
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Axessh
Affected Version From: v4.2
Affected Version To: v4.2
Patch Exists: YES
Related CWE: N/A
CPE: a:labf:axessh:4.2
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 7 SP1 EN (x86)
2019
Axessh 4.2 – ‘Log file name’ Local Stack-based Buffer Overflow
Axessh 4.2 is vulnerable to a local stack-based buffer overflow vulnerability. This vulnerability can be exploited by an attacker to execute arbitrary code on the vulnerable system. The attacker can exploit this vulnerability by sending a specially crafted malicious payload to the vulnerable application. The payload contains a malicious shellcode which is then executed on the vulnerable system. The attacker can then gain access to the system and execute arbitrary code.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update their systems to the latest version of Axessh.