[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2004-1008Date: (C)2005-01-10   (M)2023-12-22


Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
BID-11549
SECUNIA-12987
SECUNIA-13012
SECUNIA-17214
http://marc.info/?l=bugtraq&m=109889312917613&w=2
http://www.idefense.com/application/poi/display?id=155&type=vulnerabilities&flashstatus=true
GLSA-200410-29
http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414
http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416
http://www.chiark.greenend.org.uk/~sgtatham/putty/
putty-ssh2msgdebug-bo(17886)

OVAL    1
oval:org.secpod.oval:def:16583

© SecPod Technologies