CVE-2013-4207 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Tatham Putty
Severity
4.3MEDIUMNVD
CNA6.8OSV6.8
EPSS
0.6%
top 31.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 19
Latest updateMay 13
Description
Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
CVSS vector
AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9
Affected Packages4 packages
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2013-4207: filezilla - Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cau...↗2013
💬Community
1Bugzilla▶
CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852 putty: Integer overflow, leading to heap-based buffer overflow during SSH handshake↗2013-08-05