Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gqcg-rpgj-92fp

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.

Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.

EPSS

Процентиль: 68%
0.00579
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 12 лет назад

Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.

nvd
больше 12 лет назад

Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.

debian
больше 12 лет назад

Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH serv ...

EPSS

Процентиль: 68%
0.00579
Низкий

Дефекты

CWE-119