GLSA-201703-03 : PuTTY: Buffer overflow
High Nessus Plugin ID 97815
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-201703-03 (PuTTY: Buffer overflow)
A heap-corrupting buffer overflow bug in the ssh_agent_channel_data function of PuTTY was found.
A remote attacker, utilizing the SSH agent forwarding of an SSH server, could execute arbitrary code with the privileges of the user running the client or cause a Denial of Service condition.
There is no known workaround at this time.
SolutionAll PuTTY users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/putty-0.68'