The SSH server running on the remote host has a buffer overflow vulnerability.
The version of OpenSSH running on the remote Novell NetWare host has a stack-based buffer overflow vulnerability. When attempting to resolve an absolute path on the server, data is copied into a 512 byte buffer without any bounds checking. A remote, authenticated attacker could exploit this to execute arbitrary code.
There is no fix available, and the software is no longer supported.