Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY prior to 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
simon tatham putty 0.53 |
||
putty putty 0.52 |
||
putty putty 0.51 |
||
putty putty 0.50 |
||
putty putty 0.61 |
||
putty putty 0.60 |
||
putty putty 0.59 |
||
putty putty 0.58 |
||
putty putty 0.57 |
||
putty putty 0.45 |
||
putty putty 2010-06-01 |
||
simon tatham putty |
||
putty putty 0.55 |
||
putty putty 0.53b |
||
putty putty 0.49 |
||
putty putty 0.47 |
||
putty putty 0.56 |
||
putty putty 0.54 |
||
putty putty 0.48 |
||
putty putty 0.46 |