Multiple buffer overflows in Georgia SoftWorks SSH2 Server (GSW_SSHD) 7.01.0003 and earlier allow remote attackers to execute arbitrary code via a (1) a long username, which triggers an overflow in the log function; or (2) a long password.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/27103 | vdb entry |
http://securityreason.com/securityalert/3517 | third party advisory |
http://aluigi.altervista.org/adv/gswsshit-adv.txt | |
http://www.securityfocus.com/archive/1/485725/100/0/threaded | mailing list |
http://secunia.com/advisories/28307 | third party advisory |