putty pscp client-side post-auth stack buffer overwrite when processing remote file size
I
Internet Bug Bounty
Submitted None
Team Summary
Official summary from Internet Bug Bounty
https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563
Actions:
Reported by
hxd
Vulnerability Details
Technical details and impact analysis
Not sure if this will qualify but it may impact a pretty broad audience given the fact that putty code is part of many other apps (filezilla, ...) and it is the defacto standalone ssh client for windows administrators (besides openssh cygwin)
putty <= 0.66; affects putty versions dating back ~9 years.
Vulnerability Note: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563
Vendor Security Notification: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-pscp-sink-sscanf.html
provided patch and PoC to vendor. was resolved within one week (which is very impressive!).
patch/poc will be released later today on this github account.
in total reported:
* mem-corruption/remote code execution via stack buffer overwrite in putty pscp (connect vulnerable putty to poc.py to trigger an EIP=0x41414141 (AAAA) bad instruction.
* DoS condition in the parsing of SSH-Strings (core packet handling) that lead to a nullptr read. (connect putty to poc.py and type x11exploit to trigger one occurrence of a crash)
* DoS condition in the handling of unrequested forwarded-tcpip channels open requests that lead to a nullptr read. (connect putty to poc.py and type forwardedtcpipcrash to trigger crash)
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Memory Corruption - Generic