9.8
CVSSv3

CVE-2017-6542

Published: 27/03/2017 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The ssh_agent_channel_data function in PuTTY prior to 0.68 allows remote malicious users to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

putty putty

opensuse project leap 42.1

opensuse leap 42.2

Vendor Advisories

Debian Bug report logs - #857642 putty: CVE-2017-6542: integer overflow permits memory overwrite by forwarded ssh-agent connections Package: src:putty; Maintainer for src:putty is Colin Watson <cjwatson@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 13 Mar 2017 16:30:04 UTC Severity: gr ...

Exploits

Source: wwwchiarkgreenendorguk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflowhtml summary: Vulnerability: integer overflow permits memory overwrite by forwarded ssh-agent connections class: vulnerability: This is a security vulnerability difficulty: fun: Just needs tuits, and not many of them priority: high: This should be fixed i ...
PuTTY versions prior to 068 suffer from an ssh_agent_channel_data integer overflow heap corruption vulnerability ...