Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T23:32:20.848Z
Reserved: 2016-02-25T00:00:00
Link: CVE-2016-2563
No data.
Status : Deferred
Published: 2016-04-07T23:59:07.657
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2563
No data.
OpenCVE Enrichment
No data.
Weaknesses