[Secure-testing-team] Bug#857642: putty: CVE-2017-6542: integer overflow permits memory overwrite by forwarded ssh-agent connections
Salvatore Bonaccorso
carnil at debian.org
Mon Mar 13 16:28:14 UTC 2017
Source: putty
Version: 0.63-10
Severity: grave
Tags: security upstream patch
Justification: user security hole
Hi,
the following vulnerability was published for putty.
CVE-2017-6542[0]:
|integer overflow permits memory overwrite by forwarded ssh-agent
|connections
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-6542
[1] http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
[2] https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
Regards,
Salvatore
More information about the Secure-testing-team
mailing list