Loading HuntDB...

putty pscp client-side post-auth stack buffer overwrite when processing remote file size

I
Internet Bug Bounty
Submitted None

Team Summary

Official summary from Internet Bug Bounty

https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563

Reported by hxd

Vulnerability Details

Technical details and impact analysis

Memory Corruption - Generic
Not sure if this will qualify but it may impact a pretty broad audience given the fact that putty code is part of many other apps (filezilla, ...) and it is the defacto standalone ssh client for windows administrators (besides openssh cygwin) putty <= 0.66; affects putty versions dating back ~9 years. Vulnerability Note: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563 Vendor Security Notification: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-pscp-sink-sscanf.html provided patch and PoC to vendor. was resolved within one week (which is very impressive!). patch/poc will be released later today on this github account. in total reported: * mem-corruption/remote code execution via stack buffer overwrite in putty pscp (connect vulnerable putty to poc.py to trigger an EIP=0x41414141 (AAAA) bad instruction. * DoS condition in the parsing of SSH-Strings (core packet handling) that lead to a nullptr read. (connect putty to poc.py and type x11exploit to trigger one occurrence of a crash) * DoS condition in the handling of unrequested forwarded-tcpip channels open requests that lead to a nullptr read. (connect putty to poc.py and type forwardedtcpipcrash to trigger crash)

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Memory Corruption - Generic