First published: Wed Dec 01 2004(Updated: )
Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PuTTY | =0.53 | |
PuTTY | =0.50 | |
PuTTY | =0.49 | |
PuTTY | =0.51 | |
PuTTY | =0.55 | |
TortoiseCVS | =1.8 | |
PuTTY | =0.53b | |
PuTTY | =0.52 | |
PuTTY | =0.48 | |
PuTTY | =0.54 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1008 is rated as high severity due to its potential to allow arbitrary code execution through a buffer overflow.
To fix CVE-2004-1008, update PuTTY to version 0.56 or later, which resolves the integer signedness error.
Versions of PuTTY before 0.56, including 0.50, 0.51, 0.52, 0.53, and 0.54, are affected by CVE-2004-1008.
The impact of CVE-2004-1008 on affected systems includes the risk of remote attackers executing arbitrary code.
Users of PuTTY versions prior to 0.56 are at risk due to CVE-2004-1008, especially those exposed to untrusted networks.