The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
References
Configurations
History
No history.
Information
Published : 2017-03-27 17:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-6542
Mitre link : CVE-2017-6542
CVE.ORG link : CVE-2017-6542
JSON object : View
Products Affected
opensuse_project
- leap
putty
- putty
opensuse
- leap
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer