[Secure-testing-team] Bug#857642: putty: CVE-2017-6542: integer overflow permits memory overwrite by forwarded ssh-agent connections

Salvatore Bonaccorso carnil at debian.org
Mon Mar 13 16:28:14 UTC 2017


Source: putty
Version: 0.63-10
Severity: grave
Tags: security upstream patch
Justification: user security hole

Hi,

the following vulnerability was published for putty.

CVE-2017-6542[0]:
|integer overflow permits memory overwrite by forwarded ssh-agent
|connections

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-6542
[1] http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
[2] https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8

Regards,
Salvatore



More information about the Secure-testing-team mailing list