VYPR
Critical severity9.8NVD Advisory· Published Mar 27, 2017· Updated May 13, 2026

CVE-2017-6542

CVE-2017-6542

Description

The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.

Affected products

3
  • cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
    Range: <=0.67
  • OpenSUSE/Leap2 versions
    cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.