The host is running freeSSHd SSH server and is prone to remote denial of service vulnerability. NULL pointer de-referencing errors in SFTP 'rename' and 'realpath' commands. These can be exploited by passing overly long string passed as an argument to the affected commands.
Successful exploitation will cause denial of service. Impact Level: Application
Upgrade to freeSSHd version 1.2.6 or later. For updates refer to http://www.freesshd.com/index.php?ctt=download
freeSSHd freeSSHd version 220.127.116.11 and prior on Windows (all)