Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "pterm",
"binary_version": "0.67-1"
},
{
"binary_name": "pterm-dbgsym",
"binary_version": "0.67-1"
},
{
"binary_name": "putty",
"binary_version": "0.67-1"
},
{
"binary_name": "putty-dbgsym",
"binary_version": "0.67-1"
},
{
"binary_name": "putty-doc",
"binary_version": "0.67-1"
},
{
"binary_name": "putty-tools",
"binary_version": "0.67-1"
},
{
"binary_name": "putty-tools-dbgsym",
"binary_version": "0.67-1"
}
]
}