PuTTY < 0.57 SFTP Remote Buffer Overflow

high Nessus Network Monitor Plugin ID 2637

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is using a vulnerable version of PuTTY, a SSH client built for Linux and UNIX variants as well as Microsoft Windows operating systems. This version of PuTTY does not properly handle an integer value passed from the SSH Server during an SFTP connection. An attacker exploiting this flaw would need to be able to convince a user to use PuTTY to initiate an SFTP connection to a malicious SSH server. Successful exploitation would result in PuTTY crashing or possibly executing arbitrary commands.

Solution

Upgrade to PuTTY 0.57 or higher.

Plugin Details

Severity: High

ID: 2637

Family: SSH

Published: 2/22/2005

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:putty:putty

Reference Information

CVE: CVE-2005-0467

BID: 12601