Novell NetWare 6.5 OpenSSH Remote Stack Buffer Overflow

high Nessus Plugin ID 44066


The SSH server running on the remote host has a buffer overflow vulnerability.


The version of OpenSSH running on the remote Novell NetWare host has a stack-based buffer overflow vulnerability. When attempting to resolve an absolute path on the server, data is copied into a 512 byte buffer without any bounds checking. A remote, authenticated attacker could exploit this to execute arbitrary code.


There is no fix available, and the software is no longer supported.

See Also

Plugin Details

Severity: High

ID: 44066

File Name: netware_sshd_buffer_overflow.nasl

Version: 1.8

Type: remote

Family: Netware

Published: 10/4/2011

Updated: 11/15/2018

Risk Information


Risk Factor: High

Base Score: 9

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:C

Vulnerability Information

CPE: cpe:/o:novell:netware:6.5

Required KB Items: Host/OS

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/30/2010

Reference Information

BID: 42875