{"id":"UBUNTU-CVE-2017-6542","details":"The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.","modified":"2025-09-08T16:44:09Z","published":"2017-03-27T17:59:00Z","upstream":["CVE-2017-6542"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6542"},{"type":"REPORT","url":"http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html"},{"type":"REPORT","url":"https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-6542"}],"affected":[{"package":{"name":"putty","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/putty@0.67-3build0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.67-3build0.16.04.1"}]}],"versions":["0.65-2","0.66-1","0.66-2","0.66-3","0.66-4","0.67-1","0.67-2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"0.67-3build0.16.04.1","binary_name":"pterm"},{"binary_version":"0.67-3build0.16.04.1","binary_name":"putty"},{"binary_version":"0.67-3build0.16.04.1","binary_name":"putty-tools"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6542.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}