Joined: 12 May 2004
|Posted: Sun Jun 05, 2016 5:26 pm Post subject: [ GLSA 201606-01 ] PuTTY
|Gentoo Linux Security Advisory
Title: PuTTY: Multiple vulnerabilities (GLSA 201606-01)
Date: June 05, 2016
Bug(s): #565080, #576524
Multiple vulnerabilities have been found in PuTTY, the worst of
which could lead to arbitrary code execution, or cause a Denial of Service
PuTTY is a telnet and SSH client.
Vulnerable: < 0.67
Unaffected: >= 0.67
Architectures: All supported architectures
Multiple vulnerabilities have been discovered in PuTTY. Please review
the CVE identifiers referenced below for details.
Stack-based buffer overflow in the SCP command-line utility allows
remote servers to execute arbitrary code or cause a denial of service
condition via a crafted SCP-SINK file-size response to an SCP download
There is no known workaround at this time.
All PuTTY users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/putty-0.67"