CVE-2012-10060

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sysax:multi_server:*:*:*:*:*:*:*:*

History

24 Sep 2025, 00:24

Type Values Removed Values Added
References () https://advisories.checkpoint.com/defense/advisories/public/2012/cpai-23-sepc.html - () https://advisories.checkpoint.com/defense/advisories/public/2012/cpai-23-sepc.html - Third Party Advisory
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb - Exploit, Third Party Advisory
References () https://web.archive.org/web/20120302203344/http://www.pwnag3.com/2012/02/sysax-multi-server-ssh-username-exploit.html - () https://web.archive.org/web/20120302203344/http://www.pwnag3.com/2012/02/sysax-multi-server-ssh-username-exploit.html - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/18535 - () https://www.exploit-db.com/exploits/18535 - Exploit, VDB Entry
References () https://www.exploit-db.com/exploits/18557 - () https://www.exploit-db.com/exploits/18557 - Exploit, VDB Entry
References () https://www.sysax.com/ - () https://www.sysax.com/ - Product
References () https://www.vulncheck.com/advisories/sysax-multi-server-ssh-username-buffer-overflow - () https://www.vulncheck.com/advisories/sysax-multi-server-ssh-username-buffer-overflow - Third Party Advisory
CPE cpe:2.3:a:sysax:multi_server:*:*:*:*:*:*:*:*
First Time Sysax multi Server
Sysax
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

14 Aug 2025, 15:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb -

14 Aug 2025, 13:11

Type Values Removed Values Added
Summary
  • (es) Las versiones de Sysax Multi Server anteriores a la 5.55 presentan un desbordamiento de búfer basado en la pila en su servicio SSH. Cuando un atacante remoto proporciona un nombre de usuario demasiado largo durante la autenticación, el servidor copia la entrada a un búfer de pila de tamaño fijo sin la comprobación adecuada de los límites. Esto permite la ejecución remota de código en el contexto del servicio.

13 Aug 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 21:15

Updated : 2025-09-24 00:24


NVD link : CVE-2012-10060

Mitre link : CVE-2012-10060

CVE.ORG link : CVE-2012-10060


JSON object : View

Products Affected

sysax

  • multi_server
CWE
CWE-121

Stack-based Buffer Overflow