Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-1008

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2004-1008
Last Modified 05 Sep 2008 04:40:04
Published 10 Jan 2005 12:00:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-1008

Summary

Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.

Vulnerable Systems

Application

  • Putty 0.48

  • Putty 0.49

  • Putty 0.50

  • Putty 0.51

  • Putty 0.52

  • Putty 0.53

  • Putty 0.53b

  • Putty 0.54

  • Putty 0.55

  • Tortoisecvs 1.8


References

BID - 11549

GENTOO - GLSA-200410-29

XF - putty-ssh2msgdebug-bo(17886)

CONFIRM - http://www.chiark.greenend.org.uk/~sgtatham/putty/

SECUNIA - 13012

BUGTRAQ - 20041027 PuTTY SSH client vulnerability

IDEFENSE - 20041027 PuTTY SSH2_MSG_DEBUG Buffer Overflow Vulnerability

CONFIRM - http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416

CONFIRM - http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414

SECUNIA - 17214

SECUNIA - 12987


Last Updated: 27 May 2016 10:38:51