ID:3652 - Exploit for Stack-based buffer overflow in PuTTY - CVE-2016-2563
Published: July 29, 2020
PuTTY
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a crafted SCP-SINK file-size response to an SCP download request. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.