CVE-2013-4206 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Tatham Putty
Severity
6.8MEDIUMNVD
EPSS
1.1%
top 21.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 19
Latest updateMay 13
Description
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages4 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2013-4206: filezilla - Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0....↗2013
💬Community
1Bugzilla▶
CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852 putty: Integer overflow, leading to heap-based buffer overflow during SSH handshake↗2013-08-05