Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
References
Configurations
History
No history.
Information
Published : 2015-12-07 20:59
Updated : 2024-02-04 18:53
NVD link : CVE-2015-5309
Mitre link : CVE-2015-5309
CVE.ORG link : CVE-2015-5309
JSON object : View
Products Affected
opensuse
- opensuse
- leap
simon_tatham
- putty
CWE
CWE-189
Numeric Errors