Описание
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 0.66-1 |
| bionic | not-affected | 0.66-1 |
| cosmic | not-affected | 0.66-1 |
| devel | not-affected | 0.66-1 |
| disco | not-affected | 0.66-1 |
| esm-apps/bionic | not-affected | 0.66-1 |
| esm-apps/xenial | not-affected | 0.66-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
Показывать по
4.3 Medium
CVSS2
Связанные уязвимости
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Integer overflow in the terminal emulator in PuTTY before 0.66 allows ...
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
4.3 Medium
CVSS2