The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-03-27T17:00:00
Updated: 2024-08-05T15:33:20.175Z
Reserved: 2017-03-08T00:00:00
Link: CVE-2017-6542
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-03-27T17:59:00.850
Modified: 2024-11-21T03:29:59.450
Link: CVE-2017-6542
Redhat
No data.