Search criteria

2 vulnerabilities found for wodsshserver by weonlydo

CVE-2006-2407 (GCVE-0-2006-2407)

Vulnerability from nvd – Published: 2006-05-16 10:00 – Updated: 2024-08-07 17:51
VLAI?
Summary
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/19846 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/25569 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/434007/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/434402/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/1786 vdb-entryx_refsource_VUPEN
http://securityreason.com/securityalert/901 third-party-advisoryx_refsource_SREASON
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/434415/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/19845 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/477960 third-party-advisoryx_refsource_CERT-VN
http://www.securityfocus.com/archive/1/434415/30/… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/25463 vdb-entryx_refsource_OSVDB
http://marc.info/?l=full-disclosure&m=11476433870… mailing-listx_refsource_FULLDISC
http://secunia.com/advisories/20136 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1842 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1785 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/17958 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/434038/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:51:04.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19846",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19846"
          },
          {
            "name": "25569",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25569"
          },
          {
            "name": "20060514 POC exploit for freeSSHd version 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
          },
          {
            "name": "20060517 POC exploit for freeFTPd 1.0.10",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
          },
          {
            "name": "ADV-2006-1786",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1786"
          },
          {
            "name": "901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/901"
          },
          {
            "name": "freesshd-key-exchange-bo(26442)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
          },
          {
            "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
          },
          {
            "name": "19845",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19845"
          },
          {
            "name": "VU#477960",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/477960"
          },
          {
            "name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
          },
          {
            "name": "25463",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25463"
          },
          {
            "name": "20060514 POC exploit for freeSSHd version 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
          },
          {
            "name": "20136",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20136"
          },
          {
            "name": "ADV-2006-1842",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1842"
          },
          {
            "name": "ADV-2006-1785",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1785"
          },
          {
            "name": "17958",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17958"
          },
          {
            "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19846",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19846"
        },
        {
          "name": "25569",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25569"
        },
        {
          "name": "20060514 POC exploit for freeSSHd version 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
        },
        {
          "name": "20060517 POC exploit for freeFTPd 1.0.10",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
        },
        {
          "name": "ADV-2006-1786",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1786"
        },
        {
          "name": "901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/901"
        },
        {
          "name": "freesshd-key-exchange-bo(26442)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
        },
        {
          "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
        },
        {
          "name": "19845",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19845"
        },
        {
          "name": "VU#477960",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/477960"
        },
        {
          "name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
        },
        {
          "name": "25463",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25463"
        },
        {
          "name": "20060514 POC exploit for freeSSHd version 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
        },
        {
          "name": "20136",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20136"
        },
        {
          "name": "ADV-2006-1842",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1842"
        },
        {
          "name": "ADV-2006-1785",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1785"
        },
        {
          "name": "17958",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17958"
        },
        {
          "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2407",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19846",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19846"
            },
            {
              "name": "25569",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25569"
            },
            {
              "name": "20060514 POC exploit for freeSSHd version 1.0.9",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
            },
            {
              "name": "20060517 POC exploit for freeFTPd 1.0.10",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
            },
            {
              "name": "ADV-2006-1786",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1786"
            },
            {
              "name": "901",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/901"
            },
            {
              "name": "freesshd-key-exchange-bo(26442)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
            },
            {
              "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
            },
            {
              "name": "19845",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19845"
            },
            {
              "name": "VU#477960",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/477960"
            },
            {
              "name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
            },
            {
              "name": "25463",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25463"
            },
            {
              "name": "20060514 POC exploit for freeSSHd version 1.0.9",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
            },
            {
              "name": "20136",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20136"
            },
            {
              "name": "ADV-2006-1842",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1842"
            },
            {
              "name": "ADV-2006-1785",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1785"
            },
            {
              "name": "17958",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17958"
            },
            {
              "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2407",
    "datePublished": "2006-05-16T10:00:00",
    "dateReserved": "2006-05-15T00:00:00",
    "dateUpdated": "2024-08-07T17:51:04.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2407 (GCVE-0-2006-2407)

Vulnerability from cvelistv5 – Published: 2006-05-16 10:00 – Updated: 2024-08-07 17:51
VLAI?
Summary
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/19846 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/25569 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/434007/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/434402/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/1786 vdb-entryx_refsource_VUPEN
http://securityreason.com/securityalert/901 third-party-advisoryx_refsource_SREASON
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/434415/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/19845 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/477960 third-party-advisoryx_refsource_CERT-VN
http://www.securityfocus.com/archive/1/434415/30/… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/25463 vdb-entryx_refsource_OSVDB
http://marc.info/?l=full-disclosure&m=11476433870… mailing-listx_refsource_FULLDISC
http://secunia.com/advisories/20136 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1842 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1785 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/17958 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/434038/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:51:04.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19846",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19846"
          },
          {
            "name": "25569",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25569"
          },
          {
            "name": "20060514 POC exploit for freeSSHd version 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
          },
          {
            "name": "20060517 POC exploit for freeFTPd 1.0.10",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
          },
          {
            "name": "ADV-2006-1786",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1786"
          },
          {
            "name": "901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/901"
          },
          {
            "name": "freesshd-key-exchange-bo(26442)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
          },
          {
            "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
          },
          {
            "name": "19845",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19845"
          },
          {
            "name": "VU#477960",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/477960"
          },
          {
            "name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
          },
          {
            "name": "25463",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25463"
          },
          {
            "name": "20060514 POC exploit for freeSSHd version 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
          },
          {
            "name": "20136",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20136"
          },
          {
            "name": "ADV-2006-1842",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1842"
          },
          {
            "name": "ADV-2006-1785",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1785"
          },
          {
            "name": "17958",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17958"
          },
          {
            "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19846",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19846"
        },
        {
          "name": "25569",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25569"
        },
        {
          "name": "20060514 POC exploit for freeSSHd version 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
        },
        {
          "name": "20060517 POC exploit for freeFTPd 1.0.10",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
        },
        {
          "name": "ADV-2006-1786",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1786"
        },
        {
          "name": "901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/901"
        },
        {
          "name": "freesshd-key-exchange-bo(26442)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
        },
        {
          "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
        },
        {
          "name": "19845",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19845"
        },
        {
          "name": "VU#477960",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/477960"
        },
        {
          "name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
        },
        {
          "name": "25463",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25463"
        },
        {
          "name": "20060514 POC exploit for freeSSHd version 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
        },
        {
          "name": "20136",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20136"
        },
        {
          "name": "ADV-2006-1842",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1842"
        },
        {
          "name": "ADV-2006-1785",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1785"
        },
        {
          "name": "17958",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17958"
        },
        {
          "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2407",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19846",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19846"
            },
            {
              "name": "25569",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25569"
            },
            {
              "name": "20060514 POC exploit for freeSSHd version 1.0.9",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
            },
            {
              "name": "20060517 POC exploit for freeFTPd 1.0.10",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
            },
            {
              "name": "ADV-2006-1786",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1786"
            },
            {
              "name": "901",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/901"
            },
            {
              "name": "freesshd-key-exchange-bo(26442)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
            },
            {
              "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
            },
            {
              "name": "19845",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19845"
            },
            {
              "name": "VU#477960",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/477960"
            },
            {
              "name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
            },
            {
              "name": "25463",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25463"
            },
            {
              "name": "20060514 POC exploit for freeSSHd version 1.0.9",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
            },
            {
              "name": "20136",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20136"
            },
            {
              "name": "ADV-2006-1842",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1842"
            },
            {
              "name": "ADV-2006-1785",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1785"
            },
            {
              "name": "17958",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17958"
            },
            {
              "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2407",
    "datePublished": "2006-05-16T10:00:00",
    "dateReserved": "2006-05-15T00:00:00",
    "dateUpdated": "2024-08-07T17:51:04.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}