CVE-2015-5309
07.12.2015, 20:59
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.Enginsight
| Vendor | Product | Version |
|---|---|---|
| opensuse | leap | 42.1 |
| opensuse | opensuse | 13.1 |
| opensuse | opensuse | 13.2 |
| simon_tatham | putty | 𝑥 ≤ 0.65 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References