Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
2005-01-10T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | putty | putty | 0.48 | Yes |
Application | putty | putty | 0.49 | Yes |
Application | putty | putty | 0.50 | Yes |
Application | putty | putty | 0.51 | Yes |
Application | putty | putty | 0.52 | Yes |
Application | putty | putty | 0.53 | Yes |
Application | putty | putty | 0.53b | Yes |
Application | putty | putty | 0.54 | Yes |
Application | putty | putty | 0.55 | Yes |
Application | tortoisecvs | tortoisecvs | 1.8 | Yes |