The Windows version of SSH Secure Shell for Workstations contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.
The SSH Secure Shell for Workstations client includes a URL-handling feature that allows users to launch URLs that appear in the terminal window. When the user clicks on a URL, it will be launched using their default browser.
Versions 3.1 to 3.2.0 of this application contain a buffer overflow vulnerability that is triggered when the launched URL is approximately 500 characters or greater in length. To exploit this vulnerability, an attacker must supply a malicious URL to a terminal session and convince the victim to launch it.
This vulnerability allows an attacker to execute arbitrary code by convincing an unsuspecting user to click on a malicious URL.
Apply a patch
SSH Communications Security has released a Security Advisory to address this vulnerability. For more information, please see
140977
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: November 18, 2002 Updated: December 04, 2002
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
SSH Communications Security has released a Security Advisory to address this vulnerability. For more information, please see
http://www.ssh.com/company/newsroom/article/287/
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |
The CERT/CC thanks SSH Communications Security for reporting this vulnerability.
This document was written by Jeffrey P. Lanza.
CVE IDs: | None
---|---
Severity Metric: | 1.60
Date Public: | 2002-11-25
Date First Published: | 2002-12-04
Date Last Updated: | 2002-12-13 23:50 UTC
Document Revision: | 16