First published: Mon Dec 07 2015(Updated: )
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
PuTTY | <=0.65 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5309 has a high severity rating due to its potential for memory corruption and arbitrary code execution.
To fix CVE-2015-5309, update PuTTY to version 0.66 or later to mitigate the vulnerability.
CVE-2015-5309 affects PuTTY versions prior to 0.66 and specific versions of openSUSE including 13.1, 13.2, and Leap 42.1.
CVE-2015-5309 enables remote attackers to perform denial of service attacks or possibly execute arbitrary code.
CVE-2015-5309 is a remote vulnerability that can be exploited by an attacker from a different location.