spacer
spacer
spacer
spacer
 
Home Corporate Website Jobs Mailing Lists RSS Blog Advertise

Solutions For
  Security Professionals
  Security Vendors

Free Solutions For
  Open Communities
  Journalists & Media

Online Services New!
  Secunia Blog New Entry
  Software Inspector

Secunia Advisories
  Search
  Historic Advisories
  Listed By Product
  Listed By Vendor
  Statistics / Graphs
  Secunia Research
  Report Vulnerability
  About Advisories

Virus Information
  Chronological List
  Last 10 Virus Alerts
  About Virus Information

Secunia Customers
  Customer Area



spacer
spacer
spacer
PuTTY Two Integer Overflow Vulnerabilities spacer  

Secunia Advisory: SA14333  
Release Date: 2005-02-21
Last Update: 2005-02-22

Critical: spacer
Moderately critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

Software:PuTTY 0.x

CVE reference:CVE-2005-0467 (Secunia mirror)



Description:
Gaël Delalleau has reported two vulnerabilities in PuTTY, which can be exploited by malicious people to compromise a user's system.

1) An integer overflow in the "fxp_readdir_recv()" function in "sftp.c" can be exploited to execute arbitrary code via a malicious SFTP (SSH File Transfer Protocol) server sending a specially crafted respond to the "FXP_READDIR" command.

2) An integer overflow in the "fxp_open_recv()" function in "sftp.c" can be exploited to execute arbitrary code via a malicious SFTP server sending a specially crafted string field.

NOTE: Successful exploitation is only possible after host key verification.

The vulnerabilities have been reported in versions prior to 0.57.

Solution:
Update to version 0.57.
www.chiark.greenend.org.uk/~sgtatham/putty/download.html

Provided and/or discovered by:
Gaël Delalleau

Changelog:
2005-02-22: Added CVE reference and link to iDEFENSE advisory.

Original Advisory:
PuTTY:
www.chiark.greenend.org.uk/~sg...putty/wishlist/vuln-sftp-readdir.html
www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-string.html

iDEFENSE:
www.idefense.com/application/poi/display?id=201&type=vulnerabilities



Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.

4 Related Secunia Security Advisories

1. PuTTY "puttygen" Insecure File Permissions
2. PuTTY "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow Vulnerability
3. PuTTY Authentication Process Buffer Overflow Vulnerabilities
4. Terminal Emulators fail to handle escape sequences


Send Feedback to Secunia

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.



spacer




spacer
spacer

Secunia Poll

How do you verify if Adobe Flash Player is secure on client systems?


See Results   

Most Popular Advisories

1. spacer
Microsoft Windows Animated Cursor Buffer Overflow Vulnerability
spacer
2. spacer
Microsoft Windows Message Queuing Buffer Overflow Vulnerability
spacer
3. spacer
Kaspersky Products Multiple Vulnerabilities
spacer
4. spacer
Mozilla Firefox Firebug Extension "console.log()" Cross-Context Scripting
spacer
5. spacer
Internet Explorer 7 Window Injection Vulnerability
spacer
6. spacer
VMware ESX Server Multiple Vulnerabilities
spacer
7. spacer
Novell Kerberos KDC "krb5_klog_sysl og()" Buffer Overflow
spacer
8. spacer
SAP RFC Library Multiple Vulnerabilities
spacer
9. spacer
Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow
spacer
10. spacer
Enterasys Networks NetSight Products TFTPD/BOOTPD Vulnerabilities
spacer




spacer

Vulnerability Management - Terms & Conditions - Copyright 2002-2007 Secunia - Compliance - Contact Secunia

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.