CVE-2015-5309

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173021.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173021.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173094.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173094.html -
References () http://lists.opensuse.org/opensuse-updates/2015-11/msg00099.html - () http://lists.opensuse.org/opensuse-updates/2015-11/msg00099.html -
References () http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html - Vendor Advisory () http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3409 - () http://www.debian.org/security/2015/dsa-3409 -
References () http://www.securitytracker.com/id/1034308 - () http://www.securitytracker.com/id/1034308 -
References () https://security.gentoo.org/glsa/201606-01 - () https://security.gentoo.org/glsa/201606-01 -

Information

Published : 2015-12-07 20:59

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5309

Mitre link : CVE-2015-5309

CVE.ORG link : CVE-2015-5309


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

simon_tatham

  • putty
CWE
CWE-189

Numeric Errors