CVE-2004-1440
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple heap-based buffer overflows in the modpow function in PuTTY before 0.55 allow (1) remote attackers to execute arbitrary code via an SSH2 packet with a base argument that is larger than the mod argument, which causes the modpow function to write memory before the beginning of its buffer, and (2) remote malicious servers to cause a denial of service (client crash) and possibly execute arbitrary code via a large bignum during authentication.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-12-31 CVE Published
- 2005-02-13 CVE Reserved
- 2024-01-21 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=109167869528138&w=2 | Mailing List | |
http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html | X_refsource_confirm | |
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-modpow.html | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16885 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/12212 | 2017-07-11 | |
http://www.gentoo.org/security/en/glsa/glsa-200408-04.xml | 2017-07-11 | |
http://www.securityfocus.com/bid/10850 | 2017-07-11 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.48 Search vendor "Putty" for product "Putty" and version "0.48" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.49 Search vendor "Putty" for product "Putty" and version "0.49" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.50 Search vendor "Putty" for product "Putty" and version "0.50" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.51 Search vendor "Putty" for product "Putty" and version "0.51" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.52 Search vendor "Putty" for product "Putty" and version "0.52" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.53 Search vendor "Putty" for product "Putty" and version "0.53" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.53b Search vendor "Putty" for product "Putty" and version "0.53b" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.54 Search vendor "Putty" for product "Putty" and version "0.54" | - |
Affected
|