Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
CVSS
No CVSS.
References
Configurations
No configuration.
History
14 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb - |
14 Aug 2025, 13:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-13 21:15
Updated : 2025-08-14 15:15
NVD link : CVE-2012-10060
Mitre link : CVE-2012-10060
CVE.ORG link : CVE-2012-10060
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow