The host is running GoodTech SSH server and is prone to multiple buffer overflow vulnerabilities. The flaws are due to error in SFTP 'open', 'opendir', and 'unlink' commands. This can be exploited by passing overly long string argument.
Successful exploitation allows execution of arbitrary code, and denial of service. Impact Level: Application
Upgrade to GoodTech SSH Server version 6.5 or later. For updates refer to http://www.goodtechsys.com/sshdnt2000.asp
GoodTech SSH Server version 6.4 and prior on Windows (all)
Updated on 2017-03-28