CVE-2004-1008 in PuTTYinfo

Summary

Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservation

11/03/2004

Disclosure

01/10/2005

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Want to know what is going to be exploited?

We predict KEV entries!