Buffer overflow in sshbn.c in PuTTY prior to 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
putty putty 0.57 |
||
putty putty 0.56 |
||
putty putty 0.55 |
||
putty putty 0.54 |
||
putty putty 0.53b |
||
simon tatham putty |
||
putty putty 0.49 |
||
putty putty 0.48 |
||
putty putty 0.47 |
||
putty putty 0.46 |
||
putty putty 0.60 |
||
putty putty 0.58 |
||
putty putty 0.52 |
||
putty putty 0.50 |
||
putty putty 0.45 |
||
putty putty 0.61 |
||
putty putty 0.59 |
||
simon tatham putty 0.53 |
||
putty putty 0.51 |
||
putty putty 2010-06-01 |