Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "0.67-1",
"binary_name": "pterm"
},
{
"binary_version": "0.67-1",
"binary_name": "pterm-dbgsym"
},
{
"binary_version": "0.67-1",
"binary_name": "putty"
},
{
"binary_version": "0.67-1",
"binary_name": "putty-dbgsym"
},
{
"binary_version": "0.67-1",
"binary_name": "putty-doc"
},
{
"binary_version": "0.67-1",
"binary_name": "putty-tools"
},
{
"binary_version": "0.67-1",
"binary_name": "putty-tools-dbgsym"
}
]
}