← Retour aux CVEs
CVE-2019-25607
HIGH8.4
Description
Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers to execute arbitrary code by supplying an excessively long filename. Attackers can overflow the buffer at offset 214 bytes to overwrite the instruction pointer and execute shellcode with system privileges.
Details CVE
Score CVSS v3.18.4
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/22/2026
Derniere modification3/23/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-787
References
http://www.labf.com(disclosure@vulncheck.com)
http://www.labf.com/download/axessh.exe(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46858(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46922(disclosure@vulncheck.com)
https://www.exploit-db.com/shellcodes/46281(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/axessh-local-stack-based-buffer-overflow-via-log-file-name(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.