{"id":"CVE-2004-1008","details":"Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.","modified":"2026-04-10T03:36:30.191351Z","published":"2005-01-10T05:00:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/12987/"},{"type":"ADVISORY","url":"http://secunia.com/advisories/13012/"},{"type":"ADVISORY","url":"http://secunia.com/advisories/17214"},{"type":"ADVISORY","url":"http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/11549"},{"type":"FIX","url":"http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml"},{"type":"FIX","url":"http://www.securityfocus.com/bid/11549"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=109889312917613&w=2"},{"type":"WEB","url":"http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414"},{"type":"WEB","url":"http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416"},{"type":"WEB","url":"http://www.chiark.greenend.org.uk/~sgtatham/putty/"},{"type":"WEB","url":"http://www.idefense.com/application/poi/display?id=155&type=vulnerabilities&flashstatus=true"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17886"}],"schema_version":"1.7.5"}