Critical severity9.8NVD Advisory· Published Mar 27, 2017· Updated May 13, 2026
CVE-2017-6542
CVE-2017-6542
Description
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-updates/2017-03/msg00055.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/97156nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201703-03nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038067nvd
- security.gentoo.org/glsa/201706-09nvd
- www.exploit-db.com/exploits/42137/nvd
News mentions
0No linked articles in our index yet.