CVE-2015-5309 in PuTTY
Summary
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Reservation
07/01/2015
Disclosure
12/07/2015
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 79437 | PuTTY Terminal Emulator numeric error | 189 | Not defined | Official fix | CVE-2015-5309 |