CVE-2013-4206

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
VendorProductVersion
puttyputty
0.45
puttyputty
0.46
puttyputty
0.47
puttyputty
0.48
puttyputty
0.49
puttyputty
0.50
puttyputty
0.51
puttyputty
0.52
puttyputty
0.53b:b
puttyputty
0.54
puttyputty
0.55
puttyputty
0.56
puttyputty
0.57
puttyputty
0.58
puttyputty
0.59
puttyputty
0.60
puttyputty
0.61
simon_tathamputty
𝑥
≤ 0.62
simon_tathamputty
0.53
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
filezilla
bullseye
3.52.2-3+deb11u1
fixed
squeeze
no-dsa
wheezy
no-dsa
bookworm
3.63.0-1+deb12u3
fixed
trixie
3.68.0~rc1-1
fixed
sid
3.68.0-1
fixed
putty
bullseye
0.74-1+deb11u2
fixed
squeeze
no-dsa
wheezy
no-dsa
bullseye (security)
0.74-1+deb11u1
fixed
bookworm
0.78-2+deb12u2
fixed
bookworm (security)
0.78-2+deb12u1
fixed
sid
0.81-3
fixed
trixie
0.81-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
putty
raring
Fixed 0.62-10ubuntu0.1
released
quantal
Fixed 0.62-9ubuntu0.1
released
precise
Fixed 0.62-6ubuntu0.1
released
lucid
ignored