CVE-2004-1440Improper Restriction of Operations within the Bounds of a Memory Buffer in Putty

4 documents4 sources
Severity
7.5HIGHNVD
EPSS
3.5%
top 12.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31
Latest updateApr 29

Description

Multiple heap-based buffer overflows in the modpow function in PuTTY before 0.55 allow (1) remote attackers to execute arbitrary code via an SSH2 packet with a base argument that is larger than the mod argument, which causes the modpow function to write memory before the beginning of its buffer, and (2) remote malicious servers to cause a denial of service (client crash) and possibly execute arbitrary code via a large bignum during authentication.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/putty< putty 0.56-1 (bookworm)
Debianputty/putty< 0.56-1+3
NVDputty/putty8 versions+7

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8hpx-pjhm-89hr: Multiple heap-based buffer overflows in the modpow function in PuTTY before 02022-04-29
OSV
CVE-2004-1440: Multiple heap-based buffer overflows in the modpow function in PuTTY before 02004-12-31

📋Vendor Advisories

1
Debian
CVE-2004-1440: putty - Multiple heap-based buffer overflows in the modpow function in PuTTY before 0.55...2004