Vulnerability Name:

CVE-2004-1008 (CCN-17886)

Assigned:2004-10-27
Published:2004-10-27
Updated:2017-07-11
Summary:Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Tue Oct 26 2004 - 22:02:22 CDT
PuTTY SSH client vulnerability

Source: MITRE
Type: CNA
CVE-2004-1008

Source: BUGTRAQ
Type: UNKNOWN
20041027 PuTTY SSH client vulnerability

Source: CCN
Type: SA12987
PuTTY "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
12987

Source: CCN
Type: SA13012
TortoiseCVS "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow

Source: SECUNIA
Type: UNKNOWN
13012

Source: CCN
Type: SA17214
IBM TotalStorage SAN Volume Controller PuTTY Vulnerability

Source: SECUNIA
Type: UNKNOWN
17214

Source: CONFIRM
Type: UNKNOWN
http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414

Source: CONFIRM
Type: UNKNOWN
http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416

Source: CONFIRM
Type: UNKNOWN
http://www.chiark.greenend.org.uk/~sgtatham/putty/

Source: CCN
Type: PuTTY Download Web Page
PuTTY Download Page

Source: CCN
Type: GLSA-200410-29
PuTTY: Pre-authentication buffer overflow

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200410-29

Source: CCN
Type: iDEFENSE Security Advisory 10.27.04
PuTTY SSH2_MSG_DEBUG Buffer Overflow Vulnerability

Source: IDEFENSE
Type: UNKNOWN
20041027 PuTTY SSH2_MSG_DEBUG Buffer Overflow Vulnerability

Source: CCN
Type: OSVDB ID: 11164
Horde Application Framework Help Window Multiple Parameter XSS

Source: BID
Type: Patch, Vendor Advisory
11549

Source: CCN
Type: BID-11549
PuTTY Remote SSH2_MSG_DEBUG Buffer Overflow Vulnerability

Source: CCN
Type: TortoiseCVS Download Web page
TortoiseCVS - Download

Source: XF
Type: UNKNOWN
putty-ssh2msgdebug-bo(17886)

Source: XF
Type: UNKNOWN
putty-ssh2msgdebug-bo(17886)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:putty:putty:0.48:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.49:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.50:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.51:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.52:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.53:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.53b:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.54:*:*:*:*:*:*:*
  • OR cpe:/a:putty:putty:0.55:*:*:*:*:*:*:*
  • OR cpe:/a:tortoisecvs:tortoisecvs:1.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:putty:putty:0.55:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    putty putty 0.48
    putty putty 0.49
    putty putty 0.50
    putty putty 0.51
    putty putty 0.52
    putty putty 0.53
    putty putty 0.53b
    putty putty 0.54
    putty putty 0.55
    tortoisecvs tortoisecvs 1.8
    putty putty 0.55
    gentoo linux *