Lucene search

K
seebugRootSSV:60938
HistoryAug 11, 2013 - 12:00 a.m.

PuTTY 'getstring()'函数多个整数溢出漏洞

2013-08-1100:00:00
Root
www.seebug.org
21

0.027 Low

EPSS

Percentile

90.6%

BUGTRAQ ID: 61599
CVE(CAN) ID: CVE-2013-4852

PuTTY是Windows和Unix平台上的PuTTYTelnet和SSH的实现,带有xterm终端模拟器。

PuTTY 0.62在处理SSH握手时,负握手消息长度可触发堆缓冲区溢出漏洞,成功后可以当前用户权限执行任意代码。要利用此漏洞需要诱使用户连接到恶意服务器。
0
Simon Tatham PuTTY 0.61
Simon Tatham PuTTY 0.60
Simon Tatham PuTTY 0.59
Simon Tatham PuTTY 0.56
Simon Tatham PuTTY 0.55
Simon Tatham PuTTY 0.54
Simon Tatham PuTTY 0.53b
Simon Tatham PuTTY 0.53
Simon Tatham PuTTY 0.49
Simon Tatham PuTTY 0.48
厂商补丁:

Simon Tatham

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.chiark.greenend.org.uk/~sgtatham/putty/

PuTTY SVN:
http://svn.tartarus.org/sgt?view=revision&sortby=date&revision=9896

Gergely Eberhardt:
http://www.search-lab.hu/advisories/secadv-20130722