Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Leap | Opensuse | 42.1 (including) | 42.1 (including) |
| Opensuse | Opensuse | 13.1 (including) | 13.1 (including) |
| Opensuse | Opensuse | 13.2 (including) | 13.2 (including) |
| Putty | Ubuntu | precise | * |
| Putty | Ubuntu | trusty | * |
| Putty | Ubuntu | upstream | * |
| Putty | Ubuntu | vivid | * |
| Putty | Ubuntu | wily | * |