Vulnerabilities > CVE-2004-1008 - Remote SSH2_MSG_DEBUG Buffer Overflow vulnerability in PuTTY
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 9 | |
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200410-29.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200410-29 (PuTTY: Pre-authentication buffer overflow) PuTTY fails to do proper bounds checking on SSH2_MSG_DEBUG packets. The |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15581 |
published | 2004-10-28 |
reporter | This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/15581 |
title | GLSA-200410-29 : PuTTY: Pre-authentication buffer overflow |
References
- http://marc.info/?l=bugtraq&m=109889312917613&w=2
- http://secunia.com/advisories/12987/
- http://secunia.com/advisories/13012/
- http://secunia.com/advisories/17214
- http://www.chiark.greenend.org.uk/~sgtatham/putty/
- http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml
- http://www.idefense.com/application/poi/display?id=155&type=vulnerabilities&flashstatus=true
- http://www.securityfocus.com/bid/11549
- http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414
- http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17886