Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x52x-v8xm-9r9j

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 82%
0.01751
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.

nvd
больше 12 лет назад

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.

debian
больше 12 лет назад

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and o ...

EPSS

Процентиль: 82%
0.01751
Низкий