Количество 5
Количество 5
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...
openSUSE-SU-2017:0741-1
Security update for putty
GHSA-6q3h-v425-7xx2
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-6542 The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow. | CVSS3: 9.8 | 22% Средний | почти 9 лет назад | |
CVE-2017-6542 The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow. | CVSS3: 9.8 | 22% Средний | почти 9 лет назад | |
CVE-2017-6542 The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ... | CVSS3: 9.8 | 22% Средний | почти 9 лет назад | |
openSUSE-SU-2017:0741-1 Security update for putty | 22% Средний | почти 9 лет назад | ||
GHSA-6q3h-v425-7xx2 The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow. | CVSS3: 9.8 | 22% Средний | больше 3 лет назад |
Уязвимостей на страницу