Search for packages
purl | pkg:deb/ubuntu/putty@0.59-2 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1tty-pj8p-aaan
Aliases: CVE-2016-2563 |
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request. |
Affected by 7 other vulnerabilities. |
VCID-578f-zwyb-aaac
Aliases: CVE-2019-17068 |
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content. |
Affected by 0 other vulnerabilities. |
VCID-6un4-nzgb-aaak
Aliases: CVE-2019-17069 |
PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message. |
Affected by 0 other vulnerabilities. |
VCID-6xap-we19-aaaq
Aliases: CVE-2015-5309 |
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow. |
Affected by 8 other vulnerabilities. |
VCID-9mvm-26fy-aaaf
Aliases: CVE-2015-2157 |
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory. |
Affected by 9 other vulnerabilities. Affected by 9 other vulnerabilities. |
VCID-ah15-cney-aaaa
Aliases: CVE-2019-9895 |
In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding. |
Affected by 2 other vulnerabilities. |
VCID-fv5j-z33q-aaap
Aliases: CVE-2019-9898 |
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71. |
Affected by 2 other vulnerabilities. |
VCID-mjdj-hpjv-aaaj
Aliases: CVE-2019-9894 |
A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification. |
Affected by 2 other vulnerabilities. |
VCID-t391-f1q1-aaap
Aliases: CVE-2019-9897 |
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71. |
Affected by 2 other vulnerabilities. |
VCID-vspg-9eep-aaae
Aliases: CVE-2013-4852 |
Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow. |
Affected by 10 other vulnerabilities. |
VCID-yfyf-tvd9-aaan
Aliases: CVE-2017-6542 |
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow. |
Affected by 6 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|