{"api_version":"1","generated_at":"2026-05-11T14:58:20+00:00","cve":"CVE-2006-2407","urls":{"html":"https://cve.report/CVE-2006-2407","api":"https://cve.report/api/cve/CVE-2006-2407.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2407","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2407"},"summary":{"title":"CVE-2006-2407","description":"Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2006-05-16 10:02:00","updated_at":"2018-10-18 16:39:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"http://www.vupen.com/english/advisories/2006/1842","name":"ADV-2006-1842","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434007/100/0/threaded","name":"20060514 POC exploit for freeSSHd version 1.0.9","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/25463","name":"25463","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.securityfocus.com/archive/1/434038/100/0/threaded","name":"20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1785","name":"ADV-2006-1785","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434415/30/4920/threaded","name":"20060517 Re:POC exploit for freeFTPd 1.0.10","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19845","name":"19845","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"wodSSHServer Key Exchange Algorithm String Buffer Overflow - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434415/100/0/threaded","name":"20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/17958","name":"17958","refsource":"BID","tags":["Exploit"],"title":"Multiple Vendor SSH Server Remote Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securityreason.com/securityalert/901","name":"901","refsource":"SREASON","tags":[],"title":"SecurityReason - POC exploit for freeSSHd version 1.0.9","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/25569","name":"25569","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/1786","name":"ADV-2006-1786","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26442","name":"freesshd-key-exchange-bo(26442)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=full-disclosure&m=114764338702488&w=2","name":"20060514 POC exploit for freeSSHd version 1.0.9","refsource":"FULLDISC","tags":[],"title":"'[Full-disclosure] POC exploit for freeSSHd version 1.0.9' - MARC","mime":"text/x-python","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19846","name":"19846","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"FreeSSHd Key Exchange Algorithm String Buffer Overflow - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/477960","name":"VU#477960","refsource":"CERT-VN","tags":["US Government Resource"],"title":"US-CERT Vulnerability Note VU#477960","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434402/100/0/threaded","name":"20060517 POC exploit for freeFTPd 1.0.10","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20136","name":"20136","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"FreeFTPd SFTP Key Exchange Algorithm String Buffer Overflow - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2407","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2407","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freeftpd","cpe5":"freeftpd","cpe6":"1.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freeftpd","cpe5":"freeftpd","cpe6":"1.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freesshd","cpe5":"freesshd","cpe6":"1.0.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freesshd","cpe5":"freesshd","cpe6":"1.0.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"weonlydo","cpe5":"wodsshserver","cpe6":"1.2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"weonlydo","cpe5":"wodsshserver","cpe6":"1.3.3_demo","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"weonlydo","cpe5":"wodsshserver","cpe6":"1.2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2407","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"weonlydo","cpe5":"wodsshserver","cpe6":"1.3.3_demo","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2407","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"19846","refsource":"SECUNIA","url":"http://secunia.com/advisories/19846"},{"name":"25569","refsource":"OSVDB","url":"http://www.osvdb.org/25569"},{"name":"20060514 POC exploit for freeSSHd version 1.0.9","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434007/100/0/threaded"},{"name":"20060517 POC exploit for freeFTPd 1.0.10","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434402/100/0/threaded"},{"name":"ADV-2006-1786","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1786"},{"name":"901","refsource":"SREASON","url":"http://securityreason.com/securityalert/901"},{"name":"freesshd-key-exchange-bo(26442)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"},{"name":"20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434415/100/0/threaded"},{"name":"19845","refsource":"SECUNIA","url":"http://secunia.com/advisories/19845"},{"name":"VU#477960","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/477960"},{"name":"20060517 Re:POC exploit for freeFTPd 1.0.10","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434415/30/4920/threaded"},{"name":"25463","refsource":"OSVDB","url":"http://www.osvdb.org/25463"},{"name":"20060514 POC exploit for freeSSHd version 1.0.9","refsource":"FULLDISC","url":"http://marc.info/?l=full-disclosure&m=114764338702488&w=2"},{"name":"20136","refsource":"SECUNIA","url":"http://secunia.com/advisories/20136"},{"name":"ADV-2006-1842","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1842"},{"name":"ADV-2006-1785","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1785"},{"name":"17958","refsource":"BID","url":"http://www.securityfocus.com/bid/17958"},{"name":"20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434038/100/0/threaded"}]}},"nvd":{"publishedDate":"2006-05-16 10:02:00","lastModifiedDate":"2018-10-18 16:39:00","problem_types":["CWE-119"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freesshd:freesshd:1.0.9:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:weonlydo:wodsshserver:1.3.3_demo:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:weonlydo:wodsshserver:1.2.7:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freeftpd:freeftpd:1.0.10:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2407","Ordinal":"17717","Title":"CVE-2006-2407","CVE":"CVE-2006-2407","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2407","Ordinal":"1","NoteData":"Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"2407","Ordinal":"2","NoteData":"2006-05-16","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2407","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}