Lucene search

K
hackeroneHxdH1:120903
HistoryMar 06, 2016 - 10:10 a.m.

Internet Bug Bounty: putty pscp client-side post-auth stack buffer overwrite when processing remote file size

2016-03-0610:10:58
hxd
hackerone.com
76

0.016 Low

EPSS

Percentile

87.6%

Not sure if this will qualify but it may impact a pretty broad audience given the fact that putty code is part of many other apps (filezilla, â€Ķ) and it is the defacto standalone ssh client for windows administrators (besides openssh cygwin)

putty <= 0.66; affects putty versions dating back ~9 years.

Vulnerability Note: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563
Vendor Security Notification: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-pscp-sink-sscanf.html

provided patch and PoC to vendor. was resolved within one week (which is very impressive!).

patch/poc will be released later today on this github account.

in total reported:

  • mem-corruption/remote code execution via stack buffer overwrite in putty pscp (connect vulnerable putty to poc.py to trigger an EIP=0x41414141 (AAAA) bad instruction.
  • DoS condition in the parsing of SSH-Strings (core packet handling) that lead to a nullptr read. (connect putty to poc.py and type x11exploit to trigger one occurrence of a crash)
  • DoS condition in the handling of unrequested forwarded-tcpip channels open requests that lead to a nullptr read. (connect putty to poc.py and type forwardedtcpipcrash to trigger crash)