CVE-2013-4852 : Detail

CVE-2013-4852

2.14%V3
Network
2013-08-19
21h00 +00:00
2013-08-30
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Winscp>>Winscp >> Version To (including) 5.1.5

Winscp>>Winscp >> Version 3.7.6

Winscp>>Winscp >> Version 3.8.2

Winscp>>Winscp >> Version 3.8_beta

Winscp>>Winscp >> Version 4.0.4

Winscp>>Winscp >> Version 4.0.5

Winscp>>Winscp >> Version 4.2.6

Winscp>>Winscp >> Version 4.2.7

Winscp>>Winscp >> Version 4.2.8

Winscp>>Winscp >> Version 4.2.9

Winscp>>Winscp >> Version 4.3.2

Winscp>>Winscp >> Version 4.3.4

Winscp>>Winscp >> Version 4.3.5

Winscp>>Winscp >> Version 4.3.6

Winscp>>Winscp >> Version 4.3.7

Winscp>>Winscp >> Version 4.3.8

Winscp>>Winscp >> Version 4.3.9

Winscp>>Winscp >> Version 4.4.0

Winscp>>Winscp >> Version 5.0

Winscp>>Winscp >> Version 5.0.1

Winscp>>Winscp >> Version 5.0.2

Winscp>>Winscp >> Version 5.0.3

Winscp>>Winscp >> Version 5.0.4

Winscp>>Winscp >> Version 5.0.5

Winscp>>Winscp >> Version 5.0.6

Winscp>>Winscp >> Version 5.0.7

Winscp>>Winscp >> Version 5.0.8

Winscp>>Winscp >> Version 5.0.9

Winscp>>Winscp >> Version 5.1

Winscp>>Winscp >> Version 5.1.1

Winscp>>Winscp >> Version 5.1.2

Winscp>>Winscp >> Version 5.1.3

Winscp>>Winscp >> Version 5.1.4

Configuraton 0

Debian>>Debian_linux >> Version 6.0

Debian>>Debian_linux >> Version 7.0

Debian>>Debian_linux >> Version 7.1

Opensuse>>Opensuse >> Version 12.3

Configuraton 0

Putty>>Putty >> Version 0.45

Putty>>Putty >> Version 0.46

Putty>>Putty >> Version 0.47

Putty>>Putty >> Version 0.48

Putty>>Putty >> Version 0.49

Putty>>Putty >> Version 0.50

Putty>>Putty >> Version 0.51

Putty>>Putty >> Version 0.52

Putty>>Putty >> Version 0.53b

Putty>>Putty >> Version 0.54

Putty>>Putty >> Version 0.55

Putty>>Putty >> Version 0.56

Putty>>Putty >> Version 0.57

Putty>>Putty >> Version 0.58

Putty>>Putty >> Version 0.59

Putty>>Putty >> Version 0.60

Putty>>Putty >> Version 0.61

Putty>>Putty >> Version 2010-06-01

Simon_tatham>>Putty >> Version To (including) 0.62

Simon_tatham>>Putty >> Version 0.53

References

http://secunia.com/advisories/54533
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/54517
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2013/dsa-2736
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/54379
Tags : third-party-advisory, x_refsource_SECUNIA