Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-6542

Опубликовано: 27 мар. 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Средний

Описание

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
Версия до 0.67 (включая)
Конфигурация 2

Одно из

cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.22153
Средний

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
debian
почти 9 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...

suse-cvrf
почти 9 лет назад

Security update for putty

CVSS3: 9.8
github
больше 3 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

EPSS

Процентиль: 96%
0.22153
Средний

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119