Metasploit modules that can be used to exploit Freesshd products
-
Freesshd Authentication Bypass
Disclosure Date: 2010-08-11First seen: 2020-04-26exploit/windows/ssh/freesshd_authbypassThis module exploits a vulnerability found in FreeSSHd <= 1.2.6 to bypass authentication. You just need the username (which defaults to root). The exploit has been tested with both password and public key authentication. Authors: - Aris - kcope - Daniele Martini <cyrax@pkcrew.org> - Imran E. Dawoodjee <imrandawoodjee <Imran E. Dawoodjee <imrandawoodjee@infosec@gmail.com> (minor improvements)> -
FreeFTPd 1.0.10 Key Exchange Algorithm String Buffer Overflow
Disclosure Date: 2006-05-12First seen: 2020-04-26exploit/windows/ssh/freeftpd_key_exchangeThis module exploits a simple stack buffer overflow in FreeFTPd 1.0.10 This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client. This module is based on MC's freesshd_key_exchange exploit. Authors: - riaf <riaf@mysec.org> -
FreeSSHd 1.0.9 Key Exchange Algorithm String Buffer Overflow
Disclosure Date: 2006-05-12First seen: 2020-04-26exploit/windows/ssh/freesshd_key_exchangeThis module exploits a simple stack buffer overflow in FreeSSHd 1.0.9. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client. Authors: - MC <mc@metasploit.com>
3 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details