Heap-based buffer overflow in Simon Tatham products - CVE-2013-4852
Published: August 20, 2013 / Updated: August 10, 2020
Debian
SUSE
Simon Tatham
WinSCP
Debian Linux
Opensuse
PuTTY
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY. A remote attacker can use a negative size value in an RSA key signature during the SSH handshake to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2013-4852
Sources
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718779
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00041.html
- http://secunia.com/advisories/54379
- http://secunia.com/advisories/54517
- http://secunia.com/advisories/54533
- http://svn.tartarus.org/sgt?view=revision&sortby=date&revision=9896
- http://winscp.net/tracker/show_bug.cgi?id=1017
- http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-signature-stringlen.html
- http://www.debian.org/security/2013/dsa-2736
- http://www.search-lab.hu/advisories/secadv-20130722