Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-1008

Опубликовано: 10 янв. 2005
Источник: debian
EPSS Средний

Описание

Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puttyfixed0.56-1package

EPSS

Процентиль: 96%
0.2119
Средний

Связанные уязвимости

nvd
около 21 года назад

Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.

github
почти 4 года назад

Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.

EPSS

Процентиль: 96%
0.2119
Средний