Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Leap | Opensuse | 42.1 (including) | 42.1 (including) |
Opensuse | Opensuse | 13.1 (including) | 13.1 (including) |
Opensuse | Opensuse | 13.2 (including) | 13.2 (including) |
Putty | Ubuntu | precise | * |
Putty | Ubuntu | trusty | * |
Putty | Ubuntu | upstream | * |
Putty | Ubuntu | vivid | * |
Putty | Ubuntu | wily | * |