Release date:
Updated on:
Affected Systems:
Simon Tatham PuTTY 0.52-0.63
Description:
--------------------------------------------------------------------------------
Bugtraq id: 61645
CVE (CAN) ID: CVE-2013-4206
PuTTY is an implementation of PuTTYTelnet and SSH on Windows and Unix platforms, with an xterm terminal simulator.
PuTTY 0.52-0.63 when verifying the DSA Signature, the module-inverse computing has a buffer overflow vulnerability. Attackers can exploit this vulnerability to destroy the heap and possibly cause the application to crash.
<* Source: vendor
Mark Wooding
Link: http://seclists.org/oss-sec/2013/q3/291
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Simon Tatham
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.chiark.greenend.org.uk /~ Sgtatham/putty/