Lucene search

K
prionPRIOn knowledge basePRION:CVE-2017-6542
HistoryMar 27, 2017 - 5:59 p.m.

Buffer overflow

2017-03-2717:59:00
PRIOn knowledge base
www.prio-n.com
2

9.5 High

AI Score

Confidence

High

0.409 Medium

EPSS

Percentile

97.3%

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

CPENameOperatorVersion
leapeq42.2
leapeq42.1
puttyle0.67