OpenSSH is prone to a buffer-overflow vulnerability because the library fails to properly bounds check user-supplied input before copying it to an insufficiently sized memory buffer
Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the application.
OpenSSH 3.5p1 running on FreeBSD 4.9 and 4.11 is vulnerable; other versions may also be affected.
Vendor Status:
Currently we are not aware of any vendor-supplied patches