Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-01-09 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-1008
Mitre link : CVE-2004-1008
JSON object : View
CWE
Products Affected
tortoisecvs
- tortoisecvs
putty
- putty