SSH integer overflow exploit

After successful exploitation an agent will be installed. This agent will inherit the user identity and capabilities of the abused service, usually the super user, but in some configurations it might be that of any other user in the target system.
Exploit Platform
Exploit Type
Product Name