Vulnerability Description
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Putty | Putty | <= 0.67 |
| Opensuse | Leap | 42.2 |
| Opensuse Project | Leap | 42.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2017-03/msg00055.htmlThird Party Advisory
- http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflPatchVendor Advisory
- http://www.securityfocus.com/bid/97156Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038067
- https://git.tartarus.org/?p=simon/putty.git%3Ba=commitdiff%3Bh=4ff22863d895cb7eb
- https://security.gentoo.org/glsa/201703-03Third Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201706-09
- https://www.exploit-db.com/exploits/42137/
- http://lists.opensuse.org/opensuse-updates/2017-03/msg00055.htmlThird Party Advisory
- http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflPatchVendor Advisory
- http://www.securityfocus.com/bid/97156Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038067
- https://git.tartarus.org/?p=simon/putty.git%3Ba=commitdiff%3Bh=4ff22863d895cb7eb
- https://security.gentoo.org/glsa/201703-03Third Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201706-09
FAQ
What is CVE-2017-6542?
CVE-2017-6542 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect ...
How severe is CVE-2017-6542?
CVE-2017-6542 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-6542?
Check the references section above for vendor advisories and patch information. Affected products include: Putty Putty, Opensuse Leap, Opensuse Project Leap.