{"vuid":"VU#140977","idnumber":"140977","name":"SSH Secure Shell for Workstations contains buffer overflow in URL-handling feature","keywords":["SSH Secure Shell","buffer overflow","long URL"],"overview":"The Windows version of SSH Secure Shell for Workstations contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.","clean_desc":"The SSH Secure Shell for Workstations client includes a URL-handling feature that allows users to launch URLs that appear in the terminal window. When the user clicks on a URL, it will be launched using their default browser. Versions 3.1 to 3.2.0 of this application contain a buffer overflow vulnerability that is triggered when the launched URL is approximately 500 characters or greater in length. To exploit this vulnerability, an attacker must supply a malicious URL to a terminal session and convince the victim to launch it.","impact":"This vulnerability allows an attacker to execute arbitrary code by convincing an unsuspecting user to click on a malicious URL.","resolution":"Apply a patch SSH Communications Security has released a Security Advisory to address this vulnerability. For more information, please see http://www.ssh.com/company/newsroom/article/287/","workarounds":"","sysaffected":"","thanks":"The CERT/CC thanks SSH Communications Security for reporting this vulnerability.","author":"This document was written by Jeffrey P. Lanza.","public":["http://www.ssh.com/company/newsroom/article/287/","http://ftp.ssh.com/priv/secureshell/6g3zslpk/windows/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-11-19T18:30:10Z","publicdate":"2002-11-25T00:00:00Z","datefirstpublished":"2002-12-04T16:38:52Z","dateupdated":"2002-12-13T23:50:09Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"10","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"2","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.603125","cam_scorecurrentwidelyknown":"3.63375","cam_scorecurrentwidelyknownexploited":"4.7025","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.603125,"vulnote":null}