Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers to execute arbitrary code by supplying an excessively long filename. Attackers can overflow the buffer at offset 214 bytes to overwrite the instruction pointer and execute shellcode with system privileges.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labf
Labf axessh |
|
| Vendors & Products |
Labf
Labf axessh |
Sun, 22 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers to execute arbitrary code by supplying an excessively long filename. Attackers can overflow the buffer at offset 214 bytes to overwrite the instruction pointer and execute shellcode with system privileges. | |
| Title | Axessh 4.2 Local Stack-based Buffer Overflow via Log File Name | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-22T13:38:41.830Z
Reserved: 2026-03-22T13:14:15.419Z
Link: CVE-2019-25607
No data.
Status : Received
Published: 2026-03-22T14:16:28.620
Modified: 2026-03-22T14:16:28.620
Link: CVE-2019-25607
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:46:13Z
Weaknesses