7.5
CVSSv2

CVE-2002-1059

Published: 04/10/2002 Updated: 18/10/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Van Dyke SecureCRT SSH client prior to 3.4.6, and 4.x prior to 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.

Vulnerable Product Search on Vulmon Subscribe to Product

van dyke technologies securecrt 2.4

van dyke technologies securecrt 3.3

van dyke technologies securecrt 3.3.1

van dyke technologies securecrt 3.4.5

van dyke technologies securecrt 4.0_beta_1

van dyke technologies securecrt 3.1.1

van dyke technologies securecrt 3.1.2

van dyke technologies securecrt 3.4

van dyke technologies securecrt 3.4.1

van dyke technologies securecrt 3.2

van dyke technologies securecrt 3.2.1

van dyke technologies securecrt 3.4.2

van dyke technologies securecrt 3.4.3

van dyke technologies securecrt 3.4.4

van dyke technologies securecrt 3.0

van dyke technologies securecrt 3.1

van dyke technologies securecrt 3.3.2

van dyke technologies securecrt 3.3.3

van dyke technologies securecrt 4.0_beta_2

Exploits

source: wwwsecurityfocuscom/bid/5287/info The SecureCRT client is prone to a buffer-overflow condition when attempting to handle an overly long SSH1 protocol identifier string Reportedly, an attacker can exploit this issue via a malicious server Exploiting this issue may allow an attacker to execute arbitrary code or may cause the cli ...
## # $Id: securecrt_ssh1rb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## class Metasploit3 < Msf: ...
source: wwwsecurityfocuscom/bid/5287/info The SecureCRT client is prone to a buffer-overflow condition when attempting to handle an overly long SSH1 protocol identifier string Reportedly, an attacker can exploit this issue via a malicious server Exploiting this issue may allow an attacker to execute arbitrary code or may cause the cl ...