Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:09.521Z
Reserved: 2015-07-01T00:00:00
Link: CVE-2015-5309

No data.

Status : Modified
Published: 2015-12-07T20:59:08.060
Modified: 2024-11-21T02:32:46.037
Link: CVE-2015-5309

No data.