Vulnerability Details CVE-2013-4207
Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.6%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2013-4207
-
cpe:2.3:a:putty:putty:0.45
-
cpe:2.3:a:putty:putty:0.46
-
cpe:2.3:a:putty:putty:0.47
-
cpe:2.3:a:putty:putty:0.48
-
cpe:2.3:a:putty:putty:0.49
-
cpe:2.3:a:putty:putty:0.50
-
cpe:2.3:a:putty:putty:0.51
-
cpe:2.3:a:putty:putty:0.52
-
cpe:2.3:a:putty:putty:0.53b
-
cpe:2.3:a:putty:putty:0.54
-
cpe:2.3:a:putty:putty:0.55
-
cpe:2.3:a:putty:putty:0.56
-
cpe:2.3:a:putty:putty:0.57
-
cpe:2.3:a:putty:putty:0.58
-
cpe:2.3:a:putty:putty:0.59
-
cpe:2.3:a:putty:putty:0.60
-
cpe:2.3:a:putty:putty:0.61
-
cpe:2.3:a:putty:putty:2010-06-01
-
cpe:2.3:a:simon_tatham:putty:-
-
cpe:2.3:a:simon_tatham:putty:0.45
-
cpe:2.3:a:simon_tatham:putty:0.46
-
cpe:2.3:a:simon_tatham:putty:0.47
-
cpe:2.3:a:simon_tatham:putty:0.48
-
cpe:2.3:a:simon_tatham:putty:0.49
-
cpe:2.3:a:simon_tatham:putty:0.50
-
cpe:2.3:a:simon_tatham:putty:0.51
-
cpe:2.3:a:simon_tatham:putty:0.52
-
cpe:2.3:a:simon_tatham:putty:0.53
-
cpe:2.3:a:simon_tatham:putty:0.53b
-
cpe:2.3:a:simon_tatham:putty:0.54
-
cpe:2.3:a:simon_tatham:putty:0.55
-
cpe:2.3:a:simon_tatham:putty:0.56
-
cpe:2.3:a:simon_tatham:putty:0.57
-
cpe:2.3:a:simon_tatham:putty:0.58
-
cpe:2.3:a:simon_tatham:putty:0.59
-
cpe:2.3:a:simon_tatham:putty:0.60
-
cpe:2.3:a:simon_tatham:putty:0.61
-
cpe:2.3:a:simon_tatham:putty:0.62