A buffer overflow vulnerability has been reported for the Secure Shell Windows client. The vulnerability is due to an error in the URL handling of the Secure Shell client. Reportedly, it is possible for a buffer overflow condition to be triggered when a user clicks on a very long URL. An attacker can exploit this vulnerability by crafting a malicious link and enticing a victim user to click it. This will result in the buffer overflow condition being triggered and causing sensitive areas in memory being overwritten with attacker-supplied values. Any malicious attacker-supplied code embedded in the URL will be executed on the victim system.
A buffer overflow vulnerability has been reported for the Secure Shell Windows client. The vulnerability is due to an error in the URL handling of the Secure Shell client. Reportedly, it is possible for a buffer overflow condition to be triggered when a user clicks on a very long URL. An attacker can exploit this vulnerability by crafting a malicious link and enticing a victim user to click it. This will result in the buffer overflow condition being triggered and causing sensitive areas in memory being overwritten with attacker-supplied values. Any malicious attacker-supplied code embedded in the URL will be executed on the victim system.