VYPR
Critical severity9.8NVD Advisory· Published Apr 7, 2016· Updated May 6, 2026

CVE-2016-2563

CVE-2016-2563

Description

Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.

Affected products

1
  • cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:*
    Range: <=0.66

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.