Lucene search

K
nvd[email protected]NVD:CVE-2004-1440
HistoryDec 31, 2004 - 5:00 a.m.

CVE-2004-1440

2004-12-3105:00:00
web.nvd.nist.gov
1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

High

0.083 Low

EPSS

Percentile

94.4%

Multiple heap-based buffer overflows in the modpow function in PuTTY before 0.55 allow (1) remote attackers to execute arbitrary code via an SSH2 packet with a base argument that is larger than the mod argument, which causes the modpow function to write memory before the beginning of its buffer, and (2) remote malicious servers to cause a denial of service (client crash) and possibly execute arbitrary code via a large bignum during authentication.

Affected configurations

NVD
Node
puttyputtyMatch0.48
OR
puttyputtyMatch0.49
OR
puttyputtyMatch0.50
OR
puttyputtyMatch0.51
OR
puttyputtyMatch0.52
OR
puttyputtyMatch0.53
OR
puttyputtyMatch0.53b
OR
puttyputtyMatch0.54

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

High

0.083 Low

EPSS

Percentile

94.4%