Lucene search

K
saintSAINT CorporationSAINT:AF0F591E3A76FBED31AF684ED8E9ACCD
HistoryNov 28, 2008 - 12:00 a.m.

GoodTech SSH Server SFTP buffer overflow

2008-11-2800:00:00
SAINT Corporation
www.saintcorporation.com
15

EPSS

0.16

Percentile

96.0%

Added: 11/28/2008
CVE: CVE-2008-4726
BID: 31879
OSVDB: 49249

Background

GoodTech SSH Server is an SSH Server providing secure remote console, secure file transfer, and secure port forwarding capabilities for Windows platforms.

Problem

Buffer overflow vulnerabilities in GoodTech SSH Server allow remote, authenticated attackers to execute arbitrary commands by sending specially crafted arguments to SFTP commands.

Resolution

Restrict access to trusted users only.

References

<http://secunia.com/advisories/32375/&gt;

Limitations

Exploit works on GoodTech SSH Server 6.4 and requires a valid SSH login and password.

This exploit requires the **sftp** command to be present on the SAINTexploit host.

The PERL module IO::Pty is required to execute this exploit.

Platforms

Windows 2000
Windows Server 2003

EPSS

0.16

Percentile

96.0%

Related for SAINT:AF0F591E3A76FBED31AF684ED8E9ACCD