Lucene search

K
cve[email protected]CVE-2004-1440
HistoryFeb 13, 2005 - 5:00 a.m.

CVE-2004-1440

2005-02-1305:00:00
web.nvd.nist.gov
27
putty
buffer overflow
modpow
ssh2
remote code execution
denial of service
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

High

0.083 Low

EPSS

Percentile

94.4%

Multiple heap-based buffer overflows in the modpow function in PuTTY before 0.55 allow (1) remote attackers to execute arbitrary code via an SSH2 packet with a base argument that is larger than the mod argument, which causes the modpow function to write memory before the beginning of its buffer, and (2) remote malicious servers to cause a denial of service (client crash) and possibly execute arbitrary code via a large bignum during authentication.

Affected configurations

NVD
Node
puttyputtyMatch0.48
OR
puttyputtyMatch0.49
OR
puttyputtyMatch0.50
OR
puttyputtyMatch0.51
OR
puttyputtyMatch0.52
OR
puttyputtyMatch0.53
OR
puttyputtyMatch0.53b
OR
puttyputtyMatch0.54

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

High

0.083 Low

EPSS

Percentile

94.4%