Описание
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 0.67-1 |
| bionic | not-affected | 0.67-1 |
| cosmic | not-affected | 0.67-1 |
| devel | not-affected | 0.67-1 |
| disco | not-affected | 0.67-1 |
| esm-apps/bionic | not-affected | 0.67-1 |
| esm-apps/xenial | not-affected | 0.67-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needs-triage |
Показывать по
Ссылки на источники
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
Stack-based buffer overflow in the SCP command-line utility in PuTTY b ...
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
7.5 High
CVSS2
9.8 Critical
CVSS3