vendor:
FreeSSHd
by:
r0ut3r
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: FreeSSHd
Affected Version From: 1.2.2001
Affected Version To: 1.2.2001
Patch Exists: YES
Related CWE: N/A
CPE: a:freesshd:freesshd:1.2.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
FreeSSHd 1.2.1 (rename) Remote Buffer Overflow Exploit
A vulnerability in the SFTP Rename operation of FreeSSHd 1.2.1 was discovered by r0ut3r (writ3r [at] gmail.com / www.bmgsec.com.au). The vulnerability was patched in 1.2.2 and can be exploited by sending a malicious payload to the server. The payload contains NOPs, shellcode, padding, SEH and nextSEH.
Mitigation:
Upgrade to FreeSSHd 1.2.2 or later.