putty

Page content
  • Author: kikadf
  • Vulnerable: 0.62-1
  • Unaffected: 0.62-2arcturus1

Mark Wooding discovered a heap-corrupting buffer underrun bug in the modmul function which performs modular multiplication. It was discovered that non-coprime values in DSA signatures can cause a buffer overflow in the calculation code of modular inverses when verifying a DSA signature. Such a signature is invalid. It was discovered that private keys were left in memory after being used by PuTTY tools. Gergely Eberhardt from SEARCH-LAB Ltd. discovered that PuTTY is vulnerable to an integer overflow leading to heap overflow during the SSH handshake before authentication due to improper bounds checking of the length parameter received from the SSH server.

CVEs: