Lucene search

K
saintSAINT CorporationSAINT:C9426DC1130716BFDCD0A435F267F6FC
HistoryNov 28, 2008 - 12:00 a.m.

GoodTech SSH Server SFTP buffer overflow

2008-11-2800:00:00
SAINT Corporation
download.saintcorporation.com
7

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

EPSS

0.16

Percentile

96.0%

Added: 11/28/2008
CVE: CVE-2008-4726
BID: 31879
OSVDB: 49249

Background

GoodTech SSH Server is an SSH Server providing secure remote console, secure file transfer, and secure port forwarding capabilities for Windows platforms.

Problem

Buffer overflow vulnerabilities in GoodTech SSH Server allow remote, authenticated attackers to execute arbitrary commands by sending specially crafted arguments to SFTP commands.

Resolution

Restrict access to trusted users only.

References

<http://secunia.com/advisories/32375/&gt;

Limitations

Exploit works on GoodTech SSH Server 6.4 and requires a valid SSH login and password.

This exploit requires the **sftp** command to be present on the SAINTexploit host.

The PERL module IO::Pty is required to execute this exploit.

Platforms

Windows 2000
Windows Server 2003

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

EPSS

0.16

Percentile

96.0%

Related for SAINT:C9426DC1130716BFDCD0A435F267F6FC