Vulnerability Description
Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Van Dyke Technologies | Securecrt | 2.4 |
References
- http://marc.info/?l=bugtraq&m=102744150718462&w=2
- http://marc.info/?l=bugtraq&m=102746007908689&w=2
- http://www.iss.net/security_center/static/9650.phpPatchVendor Advisory
- http://www.osvdb.org/4991
- http://www.securityfocus.com/bid/5287ExploitPatchVendor Advisory
- http://www.vandyke.com/products/securecrt/security07-25-02.html
- http://marc.info/?l=bugtraq&m=102744150718462&w=2
- http://marc.info/?l=bugtraq&m=102746007908689&w=2
- http://www.iss.net/security_center/static/9650.phpPatchVendor Advisory
- http://www.osvdb.org/4991
- http://www.securityfocus.com/bid/5287ExploitPatchVendor Advisory
- http://www.vandyke.com/products/securecrt/security07-25-02.html
FAQ
What is CVE-2002-1059?
CVE-2002-1059 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
How severe is CVE-2002-1059?
CVE-2002-1059 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1059?
Check the references section above for vendor advisories and patch information. Affected products include: Van Dyke Technologies Securecrt.