Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cmv8-452f-24ph

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.

EPSS

Процентиль: 83%
0.01973
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.

nvd
больше 20 лет назад

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.

debian
больше 20 лет назад

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_r ...

EPSS

Процентиль: 83%
0.01973
Низкий