CVE-2015-5309

Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-12-07 20:59

Updated : 2024-02-04 18:53


NVD link : CVE-2015-5309

Mitre link : CVE-2015-5309

CVE.ORG link : CVE-2015-5309


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

simon_tatham

  • putty
CWE
CWE-189

Numeric Errors