Security Advisory
VanDyke Software SecureCRT memory corruption vulnerability (CVE-2020-12651)
Risk assessment: Low
Posted: May 18, 2020
Description
A memory corruption vulnerability has been discovered in SecureCRT. If certain emulation functions receive a large negative number, the remote system could corrupt memory in the terminal process, potentially causing SecureCRT to crash or the execution of arbitrary code.
In order to exploit this vulnerability, a malicious control sequence supported by the terminal emulation being used would have to be sent by a device to which a successful connection had already been established.
In internal testing, attempting to exploit this vulnerability resulted in a SecureCRT crash.
Products Not Affected
- SecureCRT 8.7.2 and newer versions for Windows, macOS, and supported Linux platforms.
Products Affected
- SecureCRT 8.7.1 and earlier versions for Windows, macOS, and supported Linux platforms.
- SecureCRT 2.3.1 and earlier for iOS.
Recommended Solution
Upgrade to SecureCRT 8.7.2 or later on Windows, macOS, and supported Linux platforms
Upgrade to SecureCRT 2.4 or later on iOS.
Vulnerability Fix Downloads
- SecureCRT 8.7.2 or later.
- Please email
for a pre-release version of SecureCRT for iOS 2.4. This version will be officially released soon.
Official Postings
Acknowledgements
Reported by Tavis Ormandy of Google Project Zero.
Revision History
May 18, 2020 – Security Advisory Published