Buffer Overflow in PuTTY Allows Denial of Service via Insecure DSA Signature Handling
CVE-2013-4207

Currently unrated

Key Information:

Vendor

Putty

Status
Vendor
CVE Published:
19 August 2013

What is CVE-2013-4207?

A buffer overflow vulnerability exists in the sshbn.c component of PuTTY versions before 0.63. This flaw allows remote SSH servers to exploit incorrectly handled DSA signatures that can trigger a denial of service (DoS) condition. The vulnerability arises during the computation of a modular inverse, leading to an overflow when division by zero is encountered within the bignum functionality. This issue differs from previous vulnerabilities affecting the same software, highlighting the need for users to update their installations to maintain security.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.