Lucene search

K
cveMitreCVE-2006-2421
HistoryMay 17, 2006 - 10:06 a.m.

CVE-2006-2421

2006-05-1710:06:00
mitre
web.nvd.nist.gov
32
cve-2006-2421
buffer overflow
pragma fortressssh
remote code execution
security vulnerability

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.9

Confidence

High

EPSS

0.053

Percentile

93.1%

Stack-based buffer overflow in Pragma FortressSSH 4.0.7.20 allows remote attackers to execute arbitrary code via long SSH_MSG_KEXINIT messages, which may cause an overflow when being logged. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Affected configurations

Nvd
Node
pragma_systemsfortresssshRange4.0.7.20
VendorProductVersionCPE
pragma_systemsfortressssh*cpe:2.3:a:pragma_systems:fortressssh:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.9

Confidence

High

EPSS

0.053

Percentile

93.1%