Buffer Overflow in PuTTY Allows Denial of Service via Insecure DSA Signature Handling
CVE-2013-4207
Currently unrated
What is CVE-2013-4207?
A buffer overflow vulnerability exists in the sshbn.c component of PuTTY versions before 0.63. This flaw allows remote SSH servers to exploit incorrectly handled DSA signatures that can trigger a denial of service (DoS) condition. The vulnerability arises during the computation of a modular inverse, leading to an overflow when division by zero is encountered within the bignum functionality. This issue differs from previous vulnerabilities affecting the same software, highlighting the need for users to update their installations to maintain security.
References
Timeline
Vulnerability published
Vulnerability Reserved