CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-6542 PuTTY ssh_agent_channel_data Function Integer Overflow Vulnerability

2017年4月12日 898点热度 0人点赞 0条评论

漏洞类别:Local

漏洞等级:

漏洞信息

PuTTY is a client program for the SSH, Telnet and Rlogin network protocols. It is integrated in multiple applications on multiple operating systems for providing SSH, Telnet and Rlogin protocol support.

A heap-corrupting integer overflow vulnerability exists in the ssh_agent_channel_data function, which processes messages sent by remote SSH clients to a forwarded agent connection.

Affected Version:
PuTTY before 0.68

漏洞危害

Successful exploitation could allow remote attackers to have unspecified impact via a large length value in an agent protocol message.

解决方案

Customers are advised to upgrade to PuTTY 0.68 or later version in order to remediate this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

PuTTY before 0.68

0day

标签: 暂无
最后更新:2017年4月12日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me