Описание
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.63-1 |
| lucid | ignored | end of life |
| precise | released | 0.62-6ubuntu0.1 |
| quantal | released | 0.62-9ubuntu0.1 |
| raring | released | 0.62-10ubuntu0.1 |
| upstream | released | 0.63 |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY ...
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
6.8 Medium
CVSS2