CVE-2004-1008 in PuTTY
Summary
Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Reservation
11/03/2004
Disclosure
01/10/2005
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 958 | PuTTY IPv6 memory corruption | 119 | Proof-of-Concept | Official fix | CVE-2004-1008 |
| 952 | PuTTY ssh2_rdpkt memory corruption | 119 | Proof-of-Concept | Official fix | CVE-2004-1008 |