freeSSHd Key Exchange Algorithm String Remote Overflow

This script is Copyright (C) 2006-2011 Ferdy Riphagen


Synopsis :

The remote SSH server is prone to a buffer overflow attack.

Description :

The remote host is using freeSSHd, a free SSH server for Windows.

The version of freeSSHd installed on the remote host does not validate
the key exchange strings sent by a SSH client. This can result in a
buffer overflow and possibly a compromise of the host if an
unauthenticated attacker sends a long key exchange string.

Solution :

Upgrade to FreeSSHd version 1.0.10 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 21580 (freesshd_key_exchange_overflow.nasl)

Bugtraq ID: 17958

CVE ID: CVE-2006-2407