Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service. | |
Title | Sysax Multi Server < 5.55 SSH Username Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-13T20:53:55.845Z
Updated: 2025-08-14T14:51:59.063Z
Reserved: 2025-08-11T19:44:04.752Z
Link: CVE-2012-10060

Updated: 2025-08-14T13:45:14.312Z

Status : Awaiting Analysis
Published: 2025-08-13T21:15:30.600
Modified: 2025-08-14T15:15:31.313
Link: CVE-2012-10060

No data.