CVE-2017-6542
CRITICALPutty < 0.67 - Memory Corruption
Title source: ruleDescription
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
Exploits (1)
References (8)
Scores
CVSS v3
9.8
EPSS
0.2215
EPSS Percentile
95.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-119
Status
published
Products (3)
opensuse/leap
42.2
opensuse_project/leap
42.1
putty/putty
< 0.67
Published
Mar 27, 2017
Tracked Since
Feb 18, 2026