Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labf
Labf axessh |
|
| Vendors & Products |
Labf
Labf axessh |
Sun, 22 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection. | |
| Title | Axessh 4.2 Denial of Service via Log File Name | |
| Weaknesses | CWE-1282 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-22T13:38:28.762Z
Reserved: 2026-03-22T12:50:42.558Z
Link: CVE-2019-25590
No data.
Status : Received
Published: 2026-03-22T14:16:24.587
Modified: 2026-03-22T14:16:24.587
Link: CVE-2019-25590
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:46:28Z
Weaknesses