Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
Metrics
Affected Vendors & Products
References
History
Wed, 24 Sep 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sysax:multi_server:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sysax
Sysax multi Server |
|
| Vendors & Products |
Sysax
Sysax multi Server |
Thu, 14 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service. | |
| Title | Sysax Multi Server < 5.55 SSH Username Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-13T20:53:55.845Z
Updated: 2025-08-14T14:51:59.063Z
Reserved: 2025-08-11T19:44:04.752Z
Link: CVE-2012-10060
Updated: 2025-08-14T13:45:14.312Z
Status : Analyzed
Published: 2025-08-13T21:15:30.600
Modified: 2025-09-24T00:24:26.233
Link: CVE-2012-10060
No data.