ID:3652 - Exploit for Stack-based buffer overflow in PuTTY - CVE-2016-2563

 
Main Vulnerability Database Exploits ID:3652 - Exploit for Stack-based buffer overflow in PuTTY - CVE-2016-2563

ID:3652 - Exploit for Stack-based buffer overflow in PuTTY - CVE-2016-2563

Published: July 29, 2020


Vulnerability identifier: #VU32320
Vulnerability risk: High
CVE-ID: CVE-2016-2563
CWE-ID: CWE-121
Exploitation vector: Remote access
Vulnerable software:
PuTTY

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing a crafted SCP-SINK file-size response to an SCP download request. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Update to version 0.67.