freeSSHd freeSSHd 1.2.1

CPE Details

freeSSHd freeSSHd 1.2.1
1.2.1
2008-09-05
18h05 +00:00
2012-12-18
20h39 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:freesshd:freesshd:1.2.1:*:*:*:*:*:*:*

Informations

Vendor

freesshd

Product

freesshd

Version

1.2.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2012-6066 2012-12-04 23h00 +00:00 freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
9.3
CVE-2008-6899 2009-08-05 20h00 +00:00 Multiple buffer overflows in freeSSHd 1.2.1 allow remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a long (1) open, (2) unlink, (3) mkdir, (4) rmdir, or (5) stat SFTP command.
9
CVE-2008-4762 2008-10-27 23h00 +00:00 Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters.
9
CVE-2008-2573 2008-06-06 16h00 +00:00 Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
8.5