Unrated severityNVD Advisory· Published Aug 13, 2025· Updated Apr 7, 2026
Sysax Multi Server < 5.55 SSH Username Buffer Overflow
CVE-2012-10060
Description
Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
Affected products
1- Range: *
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rbmitreexploit
- web.archive.org/web/20120302203344/http://www.pwnag3.com/2012/02/sysax-multi-server-ssh-username-exploit.htmlmitretechnical-descriptionexploit
- www.exploit-db.com/exploits/18535mitreexploit
- www.exploit-db.com/exploits/18557mitreexploit
- advisories.checkpoint.com/defense/advisories/public/2012/cpai-23-sepc.htmlmitrethird-party-advisory
- www.vulncheck.com/advisories/sysax-multi-server-ssh-username-buffer-overflowmitrethird-party-advisory
- www.sysax.commitreproduct
News mentions
0No linked articles in our index yet.