First published: Sun Dec 30 2001(Updated: )
Buffer overflow in VanDyke SecureCRT before 3.4.2, when using the SSH-1 protocol, allows remote attackers to execute arbitrary code via a long (1) username or (2) password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SecureCRT | <=3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1466 is classified as high severity due to the potential for remote code execution.
To fix CVE-2001-1466, upgrade VanDyke SecureCRT to version 3.4.2 or later.
CVE-2001-1466 is caused by a buffer overflow vulnerability when using the SSH-1 protocol with overly long usernames or passwords.
CVE-2001-1466 affects users of VanDyke SecureCRT versions prior to 3.4.2 using the SSH-1 protocol.
Yes, CVE-2001-1466 can be exploited remotely by attackers through malicious input for the username or password.