Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other
products that use PuTTY allows remote SSH servers to cause a denial of
service (crash) and possibly execute arbitrary code in certain applications
that use PuTTY via a negative size value in an RSA key signature during the
SSH handshake, which triggers a heap-based buffer overflow.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | putty | <Β 0.63-1 | UNKNOWN |
ubuntu | 18.04 | noarch | putty | <Β 0.63-1 | UNKNOWN |
ubuntu | 18.10 | noarch | putty | <Β 0.63-1 | UNKNOWN |
ubuntu | 12.04 | noarch | putty | <Β 0.62-6ubuntu0.1 | UNKNOWN |
ubuntu | 12.10 | noarch | putty | <Β 0.62-9ubuntu0.1 | UNKNOWN |
ubuntu | 13.04 | noarch | putty | <Β 0.62-10ubuntu0.1 | UNKNOWN |
ubuntu | 13.10 | noarch | putty | <Β 0.63-1 | UNKNOWN |
ubuntu | 14.04 | noarch | putty | <Β 0.63-1 | UNKNOWN |
ubuntu | 14.10 | noarch | putty | <Β 0.63-1 | UNKNOWN |
ubuntu | 15.04 | noarch | putty | <Β 0.63-1 | UNKNOWN |