CVE-2008-2573

Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freesshd:freesshd:1.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:47

Type Values Removed Values Added
References () http://secunia.com/advisories/30498 - Vendor Advisory () http://secunia.com/advisories/30498 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/493180/100/0/threaded - () http://www.securityfocus.com/archive/1/493180/100/0/threaded -
References () http://www.securityfocus.com/bid/29453 - Exploit () http://www.securityfocus.com/bid/29453 - Exploit
References () http://www.securitytracker.com/id?1020212 - () http://www.securitytracker.com/id?1020212 -
References () http://www.vupen.com/english/advisories/2008/1711/references - () http://www.vupen.com/english/advisories/2008/1711/references -
References () https://www.exploit-db.com/exploits/5709 - () https://www.exploit-db.com/exploits/5709 -
References () https://www.exploit-db.com/exploits/5751 - () https://www.exploit-db.com/exploits/5751 -

Information

Published : 2008-06-06 18:32

Updated : 2024-11-21 00:47


NVD link : CVE-2008-2573

Mitre link : CVE-2008-2573

CVE.ORG link : CVE-2008-2573


JSON object : View

Products Affected

freesshd

  • freesshd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer