Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

PuTTY < 0.55 modpow Function Arbitrary Code Execution

Medium

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is using a vulnerable version of PuTTY or of a PuTTY-based software (eg. PSCP or WinSCP). PuTTY is a SSH client built for Linux and UNIX variants as well as Microsoft Windows operating systems. Reportedly PuTTY is affected by a remote, pre-authentication memory corruption vulnerability and by a buffer overrun in its SCP client.

Solution

Upgrade to PuTTY 0.55 or higher.