|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
PuTTY: two vulnerabilities
Synthesis of the vulnerability
An attacker can use several vulnerabilities of PuTTY.
Impacted software: Fedora, openSUSE Leap, PuTTY, WinSCP, X2GoClient.
Severity of this computer vulnerability: 2/4.
Consequences of a hack: user access/rights.
Attacker's origin: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 24/02/2017.
Revision date: 22/03/2017.
Références of this announce: CVE-2016-6167, CVE-2017-6542, FEDORA-2017-efdd962fee, openSUSE-SU-2017:0741-1, VIGILANCE-VUL-21958.
Description of the vulnerability
Several vulnerabilities were announced in PuTTY.
An attacker can generate an integer overflow via ssh_agent_channel_data(), in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-6542]
An attacker can create a malicious DLL, and then put it in the current directory, in order to execute code. [severity:2/4; CVE-2016-6167]
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a system vulnerability bulletin. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce vulnerability database contains several thousand vulnerabilities. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.