Short Name |
SSH:OVERFLOW:FREESSHD-KEY-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SSH |
Keywords |
FreeSSHd Key Exchange Algorithm String Buffer Overflow |
Release Date |
2006/05/17 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in FreeSSHd service. Attackers, sending a maliciously crafted SSH key exchange, which is designed to exploit a buffer overflow, can execute arbitrary code with SYSTEM privileges on the server.
Multiple SSH server implementations are prone to a remote buffer-overflow vulnerability. The applications fail to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. A successful attack may facilitate arbitrary code execution. Exploiting this vulnerability may allow an attacker to gain administrative access on targeted computers.