The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
                
            Metrics
Affected Vendors & Products
References
        History
                    No history.
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2017-03-27T17:00:00
Updated: 2024-08-05T15:33:20.175Z
Reserved: 2017-03-08T00:00:00
Link: CVE-2017-6542
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Deferred
Published: 2017-03-27T17:59:00.850
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-6542
 Redhat
                        Redhat
                    No data.