Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 201606-01 ] PuTTY
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Advocate
Advocate


Joined: 12 May 2004
Posts: 2189

PostPosted: Sun Jun 05, 2016 5:26 pm    Post subject: [ GLSA 201606-01 ] PuTTY Reply with quote

Gentoo Linux Security Advisory

Title: PuTTY: Multiple vulnerabilities (GLSA 201606-01)
Severity: normal
Exploitable: remote
Date: June 05, 2016
Bug(s): #565080, #576524
ID: 201606-01

Synopsis

Multiple vulnerabilities have been found in PuTTY, the worst of
which could lead to arbitrary code execution, or cause a Denial of Service
condition.


Background

PuTTY is a telnet and SSH client.

Affected Packages

Package: net-misc/putty
Vulnerable: < 0.67
Unaffected: >= 0.67
Architectures: All supported architectures


Description

Multiple vulnerabilities have been discovered in PuTTY. Please review
the CVE identifiers referenced below for details.


Impact

Stack-based buffer overflow in the SCP command-line utility allows
remote servers to execute arbitrary code or cause a denial of service
condition via a crafted SCP-SINK file-size response to an SCP download
request.


Workaround

There is no known workaround at this time.

Resolution

All PuTTY users should upgrade to the latest version:
Code:
# emerge --sync
      # emerge --ask --oneshot --verbose ">=net-misc/putty-0.67"
   


References

CVE-2015-5309
CVE-2016-2563
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum