Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-2563

Опубликовано: 07 апр. 2016
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Средний

Описание

Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:9bis:kitty:*:*:*:*:*:*:*:*
Версия до 0.66.6.3 (включая)
cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:*
Версия до 0.66 (включая)

EPSS

Процентиль: 96%
0.28635
Средний

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.

CVSS3: 9.8
debian
почти 10 лет назад

Stack-based buffer overflow in the SCP command-line utility in PuTTY b ...

suse-cvrf
больше 9 лет назад

Security update for putty

CVSS3: 9.8
github
больше 3 лет назад

Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.

EPSS

Процентиль: 96%
0.28635
Средний

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119