PuTTY/PSFTP/PSCP Multiple Remote Integer Overflow Vulnerabilities
BID:12601
Info
PuTTY/PSFTP/PSCP Multiple Remote Integer Overflow Vulnerabilities
| Bugtraq ID: | 12601 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 21 2005 12:00AM |
| Updated: | Feb 21 2005 12:00AM |
| Credit: | Gael Delalleau is credited with discovery. |
| Vulnerable: |
Simon Tatham PuTTY 0.56 Simon Tatham PuTTY 0.55 Simon Tatham PuTTY 0.54 Simon Tatham PuTTY 0.53 b Simon Tatham PuTTY 0.53 Simon Tatham PuTTY 0.52 Simon Tatham PuTTY 0.51 Simon Tatham PuTTY 0.50 Simon Tatham PuTTY 0.49 Simon Tatham PuTTY 0.48 Simon Tatham PSFTP 0.55 Simon Tatham PSCP 0.55 Simon Tatham PSCP 0.54 Gentoo Linux |
| Not Vulnerable: |
Simon Tatham PuTTY 0.57 Simon Tatham PSFTP 0.57 Simon Tatham PSCP 0.57 |
Discussion
PuTTY/PSFTP/PSCP Multiple Remote Integer Overflow Vulnerabilities
PuTTY, PSFTP and PSCP are reported prone to multiple integer overflow vulnerabilities. The following individual issues are reported:
The first reported vulnerability, an integer overflow, exists in the 'fxp_readdir_recv()' function of the 'sftp.c' source file.
A remote malicious server may trigger this vulnerability in order to execute arbitrary code in the context of the user that is running the affected client. It should be noted that this vulnerability exists in a code path that is executed after host key verification occurs, this may hinder exploitation.
The second issue, another integer overflow, is reported to exist in the 'sftp_pkt_getstring()' of the 'sftp.c' source file.
A remote malicious server may trigger this vulnerability in order to crash the affected client or to potentially execute arbitrary code. It should be noted that this vulnerability exists in a code path that is executed after host key verification occurs, this may also hinder exploitation.
These vulnerabilities are reported to exist in versions of PSFTP and PSCP prior to version 0.57.
PuTTY, PSFTP and PSCP are reported prone to multiple integer overflow vulnerabilities. The following individual issues are reported:
The first reported vulnerability, an integer overflow, exists in the 'fxp_readdir_recv()' function of the 'sftp.c' source file.
A remote malicious server may trigger this vulnerability in order to execute arbitrary code in the context of the user that is running the affected client. It should be noted that this vulnerability exists in a code path that is executed after host key verification occurs, this may hinder exploitation.
The second issue, another integer overflow, is reported to exist in the 'sftp_pkt_getstring()' of the 'sftp.c' source file.
A remote malicious server may trigger this vulnerability in order to crash the affected client or to potentially execute arbitrary code. It should be noted that this vulnerability exists in a code path that is executed after host key verification occurs, this may also hinder exploitation.
These vulnerabilities are reported to exist in versions of PSFTP and PSCP prior to version 0.57.
Exploit / POC
PuTTY/PSFTP/PSCP Multiple Remote Integer Overflow Vulnerabilities
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
PuTTY/PSFTP/PSCP Multiple Remote Integer Overflow Vulnerabilities
Solution:
The vendor has released version 0.57 of the affected software to address these vulnerabilities.
Gentoo has released an advisory (GLSA 200502-28) and an updated eBuild to address these vulnerabilities. Gentoo users can apply this update by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=net-misc/putty-0.57"
Simon Tatham PuTTY 0.48
Simon Tatham PuTTY 0.49
Simon Tatham PuTTY 0.50
Simon Tatham PuTTY 0.51
Simon Tatham PuTTY 0.52
Simon Tatham PuTTY 0.53
Simon Tatham PuTTY 0.53 b
Simon Tatham PSCP 0.54
Simon Tatham PuTTY 0.54
Simon Tatham PSFTP 0.55
Simon Tatham PSCP 0.55
Simon Tatham PuTTY 0.55
Simon Tatham PuTTY 0.56
Solution:
The vendor has released version 0.57 of the affected software to address these vulnerabilities.
Gentoo has released an advisory (GLSA 200502-28) and an updated eBuild to address these vulnerabilities. Gentoo users can apply this update by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=net-misc/putty-0.57"
Simon Tatham PuTTY 0.48
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.49
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.50
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.51
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.52
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.53
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.53 b
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PSCP 0.54
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.54
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PSFTP 0.55
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PSCP 0.55
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.55
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Simon Tatham PuTTY 0.56
-
Simon Tatham PuTTY 0,57/PSCP 0,57/PSFTP 0,57
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
References
PuTTY/PSFTP/PSCP Multiple Remote Integer Overflow Vulnerabilities
References:
References:
- Vulnerability: crafted SFTP string may allow remote code execution (Simon Tatham)
- Multiple PuTTY SFTP Client Packet Parsing Integer Overflow Vulnerabilities (iDEFENSE)
- PuTTY Homepage (PuTTY Project)
- Vulnerability: crafted SFTP FXP_READDIR reply may allow remote code execution (Simon Tatham)