PuTTY.SSH.Client.RSA.Key.Exchange.Integer.Overflow
Description
This indicates an attack attempt to exploit an Integer Overflow Vulnerability in PuTTY.
A remote, unauthenticated attacker could exploit this vulnerability by enticing an user to connect to a malicious SSH server. Successful exploitation could result in weakened security, denial-of-service conditions, or, in the worst case, arbitrary code execution in the security context of the PuTTY SSH Client.
Affected Products
PuTTY PuTTY prior to 0.71
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-03-11 | 15.794 | Sig Added |
2020-02-27 | 15.785 | Modified |
2019-06-14 | 14.633 | Default_action:pass:drop |
2019-05-08 | 14.609 |