vendor:
Putty
by:
tintinweb
9,8
CVSS
CRITICAL
stack buffer overwrite
121
CWE
Product Name: Putty
Affected Version From: 0.59
Affected Version To: 0.66
Patch Exists: YES
Related CWE: CVE-2016-2563
CPE: a:sgtatham:putty
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-2563/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-2563/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-2563/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-7f0fbb30-e462-11e5-a3f3-080027ef73ec/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: win/nix
2016
putty
The putty SCP command-line utility (pscp) is missing a bounds-check for a stack buffer when processing the SCP-SINK file-size response to a SCP download request. This may allow a malicious server to overwrite the stack buffer within the client- application potentially leading to remote code execution.
Mitigation:
Upgrade to the latest version of Putty.