First published: Wed Feb 15 2006(Updated: )
Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Attachmate Reflection for Secure IT | =6.0 | |
Attachmate Reflection for Secure IT | =6.0 | |
F-Secure SSH Server | =3.0.0 | |
F-Secure SSH Server | =3.0.1 | |
F-Secure SSH Server | =3.0.1 | |
F-Secure SSH Server | =3.0.2 | |
F-Secure SSH Server | =3.0.3 | |
F-Secure SSH Server | =3.0.4 | |
F-Secure SSH Server | =3.0.5 | |
F-Secure SSH Server | =3.0.6 | |
F-Secure SSH Server | =3.0.7 | |
F-Secure SSH Server | =3.0.8 | |
F-Secure SSH Server | =3.0.9 | |
F-Secure SSH Server | =3.1.0 | |
F-Secure SSH Server | =3.1.0 | |
F-Secure SSH Server | =3.1.0_build9 | |
F-Secure SSH Server | =3.2.0 | |
F-Secure SSH Server | =3.2.3 | |
F-Secure SSH Server | =5.0 | |
F-Secure SSH Server | =5.1 | |
F-Secure SSH Server | =5.2 | |
F-Secure SSH Server | =5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0705 is classified as a medium severity vulnerability due to its potential to allow code execution through format string attacks.
To fix CVE-2006-0705, upgrade to the latest versions of the affected software, including Reflection for Secure IT UNIX Server 6.0.0.9 or higher and F-Secure SSH Server 5.3 build 35 or higher.
CVE-2006-0705 affects various platforms, specifically certain versions of Reflection for Secure IT Server and F-Secure SSH Server.
The vulnerability in CVE-2006-0705 is a format string vulnerability that can be exploited via a logging function in the affected software.
While there are no widely publicized exploits for CVE-2006-0705, the vulnerability theoretically allows remote attackers to execute arbitrary code on vulnerable systems.