CVE-2006-2407

N/A Unknown
Published: May 16, 2006 Modified: April 16, 2026
View on NVD

Description

Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19845
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/19846
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/20136
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/477960
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/25463
Source: cve@mitre.org
http://www.osvdb.org/25569
Source: cve@mitre.org
http://www.securityfocus.com/bid/17958
Source: cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2006/1785
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/1786
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/1842
Source: cve@mitre.org
Vendor Advisory
http://marc.info/?l=full-disclosure&m=114764338702488&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19845
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19846
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20136
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/901
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/477960
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.osvdb.org/25463
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/25569
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434007/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434038/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434402/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434415/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434415/30/4920/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17958
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2006/1785
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/1786
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/1842
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26442
Source: af854a3a-2127-422b-91ae-364da2661108

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
79.9%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

freeftpd freesshd weonlydo