Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2015-12-07T20:00:00
Updated: 2024-08-06T06:41:09.521Z
Reserved: 2015-07-01T00:00:00
Link: CVE-2015-5309
Vulnrichment
No data.
NVD
Status : Modified
Published: 2015-12-07T20:59:08.060
Modified: 2024-11-21T02:32:46.037
Link: CVE-2015-5309
Redhat
No data.