putty: CVE-2017-6542: integer overflow permits memory overwrite by forwarded ssh-agent connections

Related Vulnerabilities: CVE-2017-6542  

Debian Bug report logs - #857642
putty: CVE-2017-6542: integer overflow permits memory overwrite by forwarded ssh-agent connections

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Mon, 13 Mar 2017 16:30:04 UTC

Severity: grave

Tags: patch, security, upstream

Found in version putty/0.63-10

Fixed in version putty/0.67-3

Done: Colin Watson <cjwatson@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Colin Watson <cjwatson@debian.org>:
Bug#857642; Package src:putty. (Mon, 13 Mar 2017 16:30:07 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Colin Watson <cjwatson@debian.org>. (Mon, 13 Mar 2017 16:30:07 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: putty: CVE-2017-6542: integer overflow permits memory overwrite by forwarded ssh-agent connections
Date: Mon, 13 Mar 2017 17:28:14 +0100
Source: putty
Version: 0.63-10
Severity: grave
Tags: security upstream patch
Justification: user security hole

Hi,

the following vulnerability was published for putty.

CVE-2017-6542[0]:
|integer overflow permits memory overwrite by forwarded ssh-agent
|connections

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-6542
[1] http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
[2] https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8

Regards,
Salvatore



Reply sent to Colin Watson <cjwatson@debian.org>:
You have taken responsibility. (Wed, 22 Mar 2017 15:21:08 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Wed, 22 Mar 2017 15:21:09 GMT) (full text, mbox, link).


Message #10 received at 857642-close@bugs.debian.org (full text, mbox, reply):

From: Colin Watson <cjwatson@debian.org>
To: 857642-close@bugs.debian.org
Subject: Bug#857642: fixed in putty 0.67-3
Date: Wed, 22 Mar 2017 15:19:12 +0000
Source: putty
Source-Version: 0.67-3

We believe that the bug you reported is fixed in the latest version of
putty, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 857642@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated putty package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 22 Mar 2017 14:42:13 +0000
Source: putty
Binary: pterm putty putty-tools putty-doc
Architecture: source
Version: 0.67-3
Distribution: unstable
Urgency: high
Maintainer: Colin Watson <cjwatson@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
 pterm      - PuTTY terminal emulator
 putty      - Telnet/SSH client for X
 putty-doc  - PuTTY HTML documentation
 putty-tools - command-line tools for SSH, SCP, and SFTP
Closes: 857642
Changes:
 putty (0.67-3) unstable; urgency=high
 .
   * CVE-2017-6542: Sanity-check message length fields in CHAN_AGENT input
     (thanks, Simon Tatham; closes: #857642).
Checksums-Sha1:
 bd7367ba77e6928ad6c9789e7a4bcd94bee4d2d8 2150 putty_0.67-3.dsc
 0e3c543c3e3670cec0bbaaf0569a8ed83248763a 19612 putty_0.67-3.debian.tar.xz
 fccb1f30dcd7f93e80ceb9506846de7ca2f3a72f 7353 putty_0.67-3_source.buildinfo
Checksums-Sha256:
 2ccec198204b6d7cc6e28cce0a68ff8630645088cd5cf3683a7ec83c957c58d4 2150 putty_0.67-3.dsc
 e4b63d472edd133d70db48d00dbf1f6bcc3e2698c84c71f5732c54e7388ef010 19612 putty_0.67-3.debian.tar.xz
 20db1c2cfbd51ec8e03aeb4f3cfeaf0f871bccd2e3d293ae34fc859ecb313f47 7353 putty_0.67-3_source.buildinfo
Files:
 97c828879657fa426f047392d5cc994f 2150 net optional putty_0.67-3.dsc
 a64543d8452ddc3b4058d5f573a7a744 19612 net optional putty_0.67-3.debian.tar.xz
 acebe5e65c5f5e124068cd4e37928b9d 7353 net optional putty_0.67-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer
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=H/K/
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 18 Jun 2017 07:31:33 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:10:15 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.