CVE-2017-6542

CRITICAL

Putty < 0.67 - Memory Corruption

Title source: rule

Description

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Tim Kosse · textdoslinux
https://www.exploit-db.com/exploits/42137

Scores

CVSS v3 9.8
EPSS 0.2215
EPSS Percentile 95.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (3)
opensuse/leap 42.2
opensuse_project/leap 42.1
putty/putty < 0.67
Published Mar 27, 2017
Tracked Since Feb 18, 2026