Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
References
Information
Published : 2015-12-07 12:59
Updated : 2018-10-30 09:27
NVD link : CVE-2015-5309
Mitre link : CVE-2015-5309
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
simon_tatham
- putty
opensuse
- opensuse
- leap