Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xf6h-8pvx-cg8q

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

EPSS

Процентиль: 82%
0.01736
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

nvd
около 10 лет назад

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

debian
около 10 лет назад

Integer overflow in the terminal emulator in PuTTY before 0.66 allows ...

suse-cvrf
около 10 лет назад

Security update for putty

EPSS

Процентиль: 82%
0.01736
Низкий