Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
2013-08-19T23:55:08.767
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:N/A:P
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | putty | putty | 0.45 | Yes |
Application | putty | putty | 0.46 | Yes |
Application | putty | putty | 0.47 | Yes |
Application | putty | putty | 0.48 | Yes |
Application | putty | putty | 0.49 | Yes |
Application | putty | putty | 0.50 | Yes |
Application | putty | putty | 0.51 | Yes |
Application | putty | putty | 0.52 | Yes |
Application | putty | putty | 0.53b | Yes |
Application | putty | putty | 0.54 | Yes |
Application | putty | putty | 0.55 | Yes |
Application | putty | putty | 0.56 | Yes |
Application | putty | putty | 0.57 | Yes |
Application | putty | putty | 0.58 | Yes |
Application | putty | putty | 0.59 | Yes |
Application | putty | putty | 0.60 | Yes |
Application | putty | putty | 0.61 | Yes |
Application | putty | putty | 2010-06-01 | Yes |
Application | simon_tatham | putty | ≤ 0.62 | Yes |
Application | simon_tatham | putty | 0.53 | Yes |