CVE-2015-5309
PuTTY <0.66 - Memory Corruption
Title source: llmDescription
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
References (7)
Scores
EPSS
0.0174
EPSS Percentile
82.2%
Classification
CWE
CWE-189
Status
draft
Affected Products (4)
opensuse/leap
opensuse/opensuse
opensuse/opensuse
simon_tatham/putty
< 0.65
Timeline
Published
Dec 07, 2015
Tracked Since
Feb 18, 2026