CVE-2015-5309
Publication date 7 December 2015
Last updated 24 July 2024
Ubuntu priority
Description
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| putty | ||
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty | Not in release | |
Notes
Patch details
| Package | Patch details |
|---|---|
| putty |