File: 1838.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (71 lines) | stat: -rw-r--r-- 1,550 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Rule:

--
Sid: 1838

--
Summary:
Secure Shell (SSH) is used to remotely manage systems over encrypted TCP
sessions. This event is generated when an attempt is made to exploit 
vulnerable versions of the SecureCRT SSH client.

--
Impact:
System compromize presenting the attacker with either the opportunity to
execute arbitrary code or crash the client.

--
Detailed Information:
Van Dyke Technologies SecureCRT is a client program that allows users to
connect to servers running the Secure Shell (SSH) daemon for remote 
access via an encrypted TCP session.

A flaw in the SecureCRT client may result in arbitrary code execution 
with the privileges of the user running the client.

A buffer overflow can be caused by a server sending an overly long 
identifier string when using the SSH-1 protocol.

--
Affected Systems:
	Van Dyke Technologies SecureCRT prior to version 4.0 beta 1

Not affected:
	Van Dyke Technologies SecureCRT versions 3.2.2, 3.3.4, 3.4.6 and 4.0 beta 3.

--
Attack Scenarios:
The attacker would need to send overly large SSH version 1 identifier 
string to cause the overflow.

Exploit scripts are available

--
Ease of Attack:
Simple. Exploits are available.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <brian.caswell@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Securityfocus:
http://www.securityfocus.com/bid/5287

--