CVE-2008-4726

Stack-based buffer overflow in the SFTP subsystem in GoodTech SSH 6.4 allows remote authenticated users to execute arbitrary code via a long string to the (1) open (aka SSH_FXP_OPEN), (2) unlink, (3) opendir, and other unspecified parameters.
Configurations

Configuration 1 (hide)

cpe:2.3:a:goodtechsystems:goodtech_ssh:6.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:52

Type Values Removed Values Added
References () http://secunia.com/advisories/32375 - Vendor Advisory () http://secunia.com/advisories/32375 - Vendor Advisory
References () http://securityreason.com/securityalert/4498 - () http://securityreason.com/securityalert/4498 -
References () http://www.securityfocus.com/archive/1/497745/100/0/threaded - () http://www.securityfocus.com/archive/1/497745/100/0/threaded -
References () http://www.securityfocus.com/bid/31879 - Exploit () http://www.securityfocus.com/bid/31879 - Exploit
References () http://www.vupen.com/english/advisories/2008/2895 - () http://www.vupen.com/english/advisories/2008/2895 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46038 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46038 -
References () https://www.exploit-db.com/exploits/6804 - () https://www.exploit-db.com/exploits/6804 -

Information

Published : 2008-10-24 00:00

Updated : 2024-11-21 00:52


NVD link : CVE-2008-4726

Mitre link : CVE-2008-4726

CVE.ORG link : CVE-2008-4726


JSON object : View

Products Affected

goodtechsystems

  • goodtech_ssh
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer