Логотип exploitDog
bind:CVE-2017-6542
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-6542

Количество 5

Количество 5

ubuntu логотип

CVE-2017-6542

почти 9 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2017-6542

почти 9 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2017-6542

почти 9 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...

CVSS3: 9.8
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2017:0741-1

почти 9 лет назад

Security update for putty

EPSS: Средний
github логотип

GHSA-6q3h-v425-7xx2

больше 3 лет назад

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-6542

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
22%
Средний
почти 9 лет назад
nvd логотип
CVE-2017-6542

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
22%
Средний
почти 9 лет назад
debian логотип
CVE-2017-6542

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...

CVSS3: 9.8
22%
Средний
почти 9 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0741-1

Security update for putty

22%
Средний
почти 9 лет назад
github логотип
GHSA-6q3h-v425-7xx2

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CVSS3: 9.8
22%
Средний
больше 3 лет назад

Уязвимостей на страницу