CVE-2015-5309 in PuTTY
Resumen (Inglés)
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Reservar
2015-07-01
Divulgación
2015-12-07
Estado
Confirmado
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 79437 | PuTTY Terminal Emulator Ejecución remota de código | 189 | No está definido | Arreglo oficial | CVE-2015-5309 |
Descripción
CPE
CWE
CVSS
Hazañas
Historia
Diferencia
Relacionar
Inteligencia de amenazas
API JSON
API XML
API CSV