National Vulnerability Database

National Vulnerability Database

National Vulnerability

Search Results (Refine Search)

There are 3 matching records.
Vuln ID Summary CVSS Severity

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

Published: March 27, 2017; 01:59:00 PM -04:00
V2: 7.5 HIGH

PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.

Published: March 07, 2007; 04:19:00 PM -05:00
V2: 1.9 LOW

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.

Published: February 21, 2005; 12:00:00 AM -05:00
V2: 7.5 HIGH