Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h3qw-gcpw-f6mg

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

EPSS

Процентиль: 78%
0.01136
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 12 лет назад

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

nvd
больше 12 лет назад

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

debian
больше 12 лет назад

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY ...

EPSS

Процентиль: 78%
0.01136
Низкий

Дефекты

CWE-119