First published: Mon Aug 19 2013(Updated: )
Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinSCP | <=5.1.5 | |
WinSCP | =3.7.6 | |
WinSCP | =3.8.2 | |
WinSCP | =3.8_beta | |
WinSCP | =4.0.4 | |
WinSCP | =4.0.5 | |
WinSCP | =4.2.6 | |
WinSCP | =4.2.7 | |
WinSCP | =4.2.8 | |
WinSCP | =4.2.9 | |
WinSCP | =4.3.2 | |
WinSCP | =4.3.4 | |
WinSCP | =4.3.5 | |
WinSCP | =4.3.6 | |
WinSCP | =4.3.7 | |
WinSCP | =4.3.8 | |
WinSCP | =4.3.9 | |
WinSCP | =4.4.0 | |
WinSCP | =5.0-beta | |
WinSCP | =5.0.1-beta | |
WinSCP | =5.0.2-beta | |
WinSCP | =5.0.3-beta | |
WinSCP | =5.0.4-beta | |
WinSCP | =5.0.5-beta | |
WinSCP | =5.0.6-beta | |
WinSCP | =5.0.7-beta | |
WinSCP | =5.0.8-rc | |
WinSCP | =5.0.9-rc | |
WinSCP | =5.1 | |
WinSCP | =5.1.1 | |
WinSCP | =5.1.2 | |
WinSCP | =5.1.3 | |
WinSCP | =5.1.4 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =7.1 | |
openSUSE | =12.3 | |
PuTTY | =0.45 | |
PuTTY | =0.46 | |
PuTTY | =0.47 | |
PuTTY | =0.48 | |
PuTTY | =0.49 | |
PuTTY | =0.50 | |
PuTTY | =0.51 | |
PuTTY | =0.52 | |
PuTTY | =0.53b | |
PuTTY | =0.54 | |
PuTTY | =0.55 | |
PuTTY | =0.56 | |
PuTTY | =0.57 | |
PuTTY | =0.58 | |
PuTTY | =0.59 | |
PuTTY | =0.60 | |
PuTTY | =0.61 | |
PuTTY | =2010-06-01-r8967 | |
PuTTY | <=0.62 | |
PuTTY | =0.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4852 is classified as a high-severity vulnerability due to its potential for denial of service and possible arbitrary code execution.
To fix CVE-2013-4852, you should upgrade to the latest version of PuTTY or WinSCP that is not affected by this vulnerability.
CVE-2013-4852 affects PuTTY versions 0.62 and earlier, as well as multiple versions of WinSCP prior to 5.1.6.
CVE-2013-4852 can be exploited by remote SSH servers to crash affected applications or potentially execute arbitrary code.
CVE-2013-4852 involves an integer overflow vulnerability that occurs during RSA key signature processing.