Vulnerability Description
The TFTP server in ExtraPuTTY 0.30 and earlier allows remote attackers to cause a denial of service (crash) via a large (1) read or (2) write TFTP protocol message.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Extraputty | Extraputty | <= 0.29 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-ServiceExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/540300/100/0/threaded
- http://www.securityfocus.com/bid/96973Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41639/
- http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-ServiceExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/540300/100/0/threaded
- http://www.securityfocus.com/bid/96973Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41639/
FAQ
What is CVE-2017-7183?
CVE-2017-7183 is a vulnerability with a CVSS score of 7.5 (HIGH). The TFTP server in ExtraPuTTY 0.30 and earlier allows remote attackers to cause a denial of service (crash) via a large (1) read or (2) write TFTP protocol message.
How severe is CVE-2017-7183?
CVE-2017-7183 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7183?
Check the references section above for vendor advisories and patch information. Affected products include: Extraputty Extraputty.