Lucene search

K
cve[email protected]CVE-2013-4206
HistoryAug 19, 2013 - 11:55 p.m.

CVE-2013-4206

2013-08-1923:55:08
CWE-119
web.nvd.nist.gov
38
3
cve-2013-4206
putty
ssh
buffer underflow
denial of service
memory corruption
code execution
dsa signature
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.3 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

86.9%

Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.

Affected configurations

NVD
Node
puttyputtyMatch0.45
OR
puttyputtyMatch0.46
OR
puttyputtyMatch0.47
OR
puttyputtyMatch0.48
OR
puttyputtyMatch0.49
OR
puttyputtyMatch0.50
OR
puttyputtyMatch0.51
OR
puttyputtyMatch0.52
OR
puttyputtyMatch0.53b
OR
puttyputtyMatch0.54
OR
puttyputtyMatch0.55
OR
puttyputtyMatch0.56
OR
puttyputtyMatch0.57
OR
puttyputtyMatch0.58
OR
puttyputtyMatch0.59
OR
puttyputtyMatch0.60
OR
puttyputtyMatch0.61
OR
puttyputtyMatch2010-06-01r8967development_snapshot
OR
simon_tathamputtyRange≀0.62
OR
simon_tathamputtyMatch0.53

Social References

More

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.3 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

86.9%