CVE-2015-5309

PuTTY <0.66 - Memory Corruption

Title source: llm

Description

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.

Scores

EPSS 0.0174
EPSS Percentile 82.2%

Classification

CWE
CWE-189
Status draft

Affected Products (4)

opensuse/leap
opensuse/opensuse
opensuse/opensuse
simon_tatham/putty < 0.65

Timeline

Published Dec 07, 2015
Tracked Since Feb 18, 2026