CVE-2015-5309 in PuTTYinformación

Resumen (Inglés)

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservar

2015-07-01

Divulgación

2015-12-07

Estado

Confirmado

Voces

VulDB provides additional information and datapoints for this CVE:

Fuentes

Want to know what is going to be exploited?

We predict KEV entries!