Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-2563

CWE-119Buffer Overflow11 documents8 sources
Severity
9.8CRITICAL
EPSS
28.6%
top 3.46%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 7
Latest updateMay 17

Description

Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Debianputty< 0.67-1+3
NVD9bis/kitty0.66.6.3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4hmm-v4j9-3hw2: Stack-based buffer overflow in the SCP command-line utility in PuTTY before 02022-05-17
CVEList
CVE-2016-2563: Stack-based buffer overflow in the SCP command-line utility in PuTTY before 02016-04-07
OSV
CVE-2016-2563: Stack-based buffer overflow in the SCP command-line utility in PuTTY before 02016-04-07

💥Exploits & PoCs

1
Exploit-DB
Putty pscp 0.66 - Stack Buffer Overwrite2016-03-10

📋Vendor Advisories

1
Debian
CVE-2016-2563: putty - Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67...2016

💬Community

5
HackerOne
putty pscp client-side post-auth stack buffer overwrite when processing remote file size2019-11-12
Bugzilla
CVE-2016-2563 putty: old-style scp downloads may allow remote code execution [epel-5]2016-03-10
Bugzilla
CVE-2016-2563 putty: old-style scp downloads may allow remote code execution [epel-6]2016-03-10
Bugzilla
CVE-2016-2563 putty: old-style scp downloads may allow remote code execution [fedora-all]2016-03-10
Bugzilla
CVE-2016-2563 putty: old-style scp downloads may allow remote code execution2016-03-10
CVE-2016-2563 (CRITICAL CVSS 9.8) | Stack-based buffer overflow in the | cvebase.io