Vulnerability Description
Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freesshd | Freesshd | 1.2.1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/30498Vendor Advisory
- http://www.securityfocus.com/archive/1/493180/100/0/threaded
- http://www.securityfocus.com/bid/29453Exploit
- http://www.securitytracker.com/id?1020212
- http://www.vupen.com/english/advisories/2008/1711/references
- https://www.exploit-db.com/exploits/5709
- https://www.exploit-db.com/exploits/5751
- http://secunia.com/advisories/30498Vendor Advisory
- http://www.securityfocus.com/archive/1/493180/100/0/threaded
- http://www.securityfocus.com/bid/29453Exploit
- http://www.securitytracker.com/id?1020212
- http://www.vupen.com/english/advisories/2008/1711/references
- https://www.exploit-db.com/exploits/5709
- https://www.exploit-db.com/exploits/5751
FAQ
What is CVE-2008-2573?
CVE-2008-2573 is a vulnerability with a CVSS score of 8.5 (HIGH). Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
How severe is CVE-2008-2573?
CVE-2008-2573 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2573?
Check the references section above for vendor advisories and patch information. Affected products include: Freesshd Freesshd.