First published: Wed May 17 2006(Updated: )
Stack-based buffer overflow in Pragma FortressSSH 4.0.7.20 allows remote attackers to execute arbitrary code via long SSH_MSG_KEXINIT messages, which may cause an overflow when being logged. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pragmasys Fortress Ssh | <=4.0.7.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2421 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2006-2421, it is recommended to upgrade FortressSSH to a version higher than 4.0.7.20.
CVE-2006-2421 affects Pragma Systems FortressSSH version 4.0.7.20 and all prior versions.
CVE-2006-2421 is a stack-based buffer overflow vulnerability.
Yes, CVE-2006-2421 can be exploited remotely via crafted SSH_MSG_KEXINIT messages.