Описание
Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitVDB Entry
- ExploitVDB Entry
- Product
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.55 (исключая)
cpe:2.3:a:sysax:multi_server:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.6906
Средний
9.8 Critical
CVSS3
Дефекты
CWE-121
Связанные уязвимости
CVSS3: 9.8
github
6 месяцев назад
Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
EPSS
Процентиль: 99%
0.6906
Средний
9.8 Critical
CVSS3
Дефекты
CWE-121