CVE-2015-5309 in PuTTYinfo

Summary

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservation

07/01/2015

Disclosure

12/07/2015

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!