First published: Mon Feb 21 2005(Updated: )
Multiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PuTTY | <=0.56 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0467 is considered a critical vulnerability due to its potential to allow arbitrary code execution from remote web sites.
To fix CVE-2005-0467, update PuTTY to version 0.57 or later to eliminate the integer overflow vulnerabilities.
CVE-2005-0467 affects PuTTY versions up to and including 0.56.
The vulnerability in CVE-2005-0467 involves integer overflows in the sftp_pkt_getstring and fxp_readdir_recv functions.
Yes, CVE-2005-0467 can be exploited remotely by malicious websites via crafted SFTP responses.