Axessh 4.2 Stack-Based Buffer Overflow Vulnerability
Axessh 4.2 is vulnerable to a stack-based buffer overflow in the log file name field, allowing local attackers to execute arbitrary code by supplying an excessively long filename.
Axessh 4.2, a software of unknown purpose from labf.com, is susceptible to a stack-based buffer overflow vulnerability (CVE-2019-25607). This vulnerability was reported on March 22, 2026. A local attacker can exploit this flaw by providing an overly long filename for the log file, overflowing a buffer of 214 bytes. Successful exploitation allows the attacker to overwrite the instruction pointer and execute arbitrary code with system privileges. This poses a significant risk to systems running Axessh 4.2, as it allows for local privilege escalation and potential system compromise. The vulnerability is present due to insufficient bounds checking on the length of the provided log filename.
Attack Chain
- The attacker gains local access to a system running Axessh 4.2.
- The attacker identifies the logging functionality within Axessh 4.2.
- The attacker crafts an excessively long filename, exceeding 214 bytes.
- The attacker provides the malicious filename as input for the log file name.
- Axessh 4.2 attempts to write the log file with the attacker-controlled name.
- The excessively long filename overflows the buffer on the stack.
- The buffer overflow overwrites the instruction pointer.
- The attacker gains arbitrary code execution with the privileges of the Axessh process.
Impact
Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with system privileges. This could lead to complete system compromise, including data theft, installation of malware, or denial of service. The CVSS v3.1 score of 8.4 indicates a high severity. Due to the nature of local privilege escalation, the impact is limited to systems where an attacker already has a foothold.
Recommendation
- Apply any available patches or updates for Axessh 4.2 provided by the vendor (check http://www.labf.com).
- Monitor process creation events for suspicious processes spawned by Axessh (use the process_creation category).
- Deploy the Sigma rule to detect potential exploitation attempts by monitoring for processes that create log files with unusually long names.
- Block access to the identified URLs associated with the exploit (http://www.labf.com, https://www.exploit-db.com/exploits/46858) at the network perimeter.
Detection coverage 2
Detect Suspiciously Long Log Filenames
highDetects the creation of log files with excessively long names, potentially indicating a buffer overflow attempt.
Detect Axessh Process Spawning Suspicious Processes
criticalDetects Axessh spawning processes that are not normally associated with its function, possibly indicating code execution.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
6
url
| Type | Value |
|---|---|
| url | http://www.labf.com |
| url | http://www.labf.com/download/axessh.exe |
| url | https://www.exploit-db.com/exploits/46858 |
| url | https://www.exploit-db.com/exploits/46922 |
| url | https://www.exploit-db.com/shellcodes/46281 |
| url | https://www.vulncheck.com/advisories/axessh-local-stack-based-buffer-overflow-via-log-file-name |