Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2005-0467

Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.02
EPSS Ranking 82.6%
CVSS Severity
CVSS v2 Score 7.5
References
Products affected by CVE-2005-0467
  • Putty » Putty » Version: N/A
    cpe:2.3:a:putty:putty:-
  • Putty » Putty » Version: 0.45
    cpe:2.3:a:putty:putty:0.45
  • Putty » Putty » Version: 0.46
    cpe:2.3:a:putty:putty:0.46
  • Putty » Putty » Version: 0.47
    cpe:2.3:a:putty:putty:0.47
  • Putty » Putty » Version: 0.48
    cpe:2.3:a:putty:putty:0.48
  • Putty » Putty » Version: 0.49
    cpe:2.3:a:putty:putty:0.49
  • Putty » Putty » Version: 0.50
    cpe:2.3:a:putty:putty:0.50
  • Putty » Putty » Version: 0.51
    cpe:2.3:a:putty:putty:0.51
  • Putty » Putty » Version: 0.52
    cpe:2.3:a:putty:putty:0.52
  • Putty » Putty » Version: 0.53
    cpe:2.3:a:putty:putty:0.53
  • Putty » Putty » Version: 0.53b
    cpe:2.3:a:putty:putty:0.53b
  • Putty » Putty » Version: 0.54
    cpe:2.3:a:putty:putty:0.54
  • Putty » Putty » Version: 0.55
    cpe:2.3:a:putty:putty:0.55
  • Putty » Putty » Version: 0.56
    cpe:2.3:a:putty:putty:0.56


Contact Us

Shodan ® - All rights reserved