CVE-2006-2407
Summary
| CVE | CVE-2006-2407 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-05-16 10:02:00 UTC |
| Updated | 2018-10-18 16:39:00 UTC |
| Description | Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Freeftpd | Freeftpd | 1.0.10 | All | All | All |
| Application | Freeftpd | Freeftpd | 1.0.10 | All | All | All |
| Application | Freesshd | Freesshd | 1.0.9 | All | All | All |
| Application | Freesshd | Freesshd | 1.0.9 | All | All | All |
| Application | Weonlydo | Wodsshserver | 1.2.7 | All | All | All |
| Application | Weonlydo | Wodsshserver | 1.3.3_demo | All | All | All |
| Application | Weonlydo | Wodsshserver | 1.2.7 | All | All | All |
| Application | Weonlydo | Wodsshserver | 1.3.3_demo | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 25463 | OSVDB | www.osvdb.org | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| wodSSHServer Key Exchange Algorithm String Buffer Overflow - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Multiple Vendor SSH Server Remote Buffer Overflow Vulnerability | BID | www.securityfocus.com | Exploit |
| SecurityReason - POC exploit for freeSSHd version 1.0.9 | SREASON | securityreason.com | |
| 25569 | OSVDB | www.osvdb.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| '[Full-disclosure] POC exploit for freeSSHd version 1.0.9' - MARC | FULLDISC | marc.info | |
| FreeSSHd Key Exchange Algorithm String Buffer Overflow - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| US-CERT Vulnerability Note VU#477960 | CERT-VN | www.kb.cert.org | US Government Resource |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| FreeFTPd SFTP Key Exchange Algorithm String Buffer Overflow - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.