Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4206

Опубликовано: 19 авг. 2013
Источник: debian
EPSS Низкий

Описание

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puttyfixed0.63-1package
filezillafixed3.7.3-1package
filezillano-dsasqueezepackage
filezillano-dsawheezypackage

Примечания

  • http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-modmul.html

EPSS

Процентиль: 78%
0.01136
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

nvd
больше 12 лет назад

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

github
больше 3 лет назад

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

EPSS

Процентиль: 78%
0.01136
Низкий