Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

PuTTY < 0.55 modpow Function Arbitrary Code Execution



The remote host is vulnerable to a buffer overflow.


The remote host is using a vulnerable version of PuTTY or of a PuTTY-based software (eg. PSCP or WinSCP). PuTTY is a SSH client built for Linux and UNIX variants as well as Microsoft Windows operating systems. Reportedly PuTTY is affected by a remote, pre-authentication memory corruption vulnerability and by a buffer overrun in its SCP client.


Upgrade to PuTTY 0.55 or higher.