CVE-2005-0467

NameCVE-2005-0467
DescriptionMultiple integer overflows in the (1) sftp_pkt_getstring and (2) fxp_readdir_recv functions in the PSFTP and PSCP clients for PuTTY 0.56, and possibly earlier versions, allow remote malicious web sites to execute arbitrary code via SFTP responses that corrupt the heap after insufficient memory has been allocated.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
putty (PTS)jessie, jessie (lts)0.63-10+deb8u2fixed
stretch (security), stretch (lts), stretch0.67-3+deb9u1fixed
buster (security), buster, buster (lts)0.74-1+deb11u1~deb10u2fixed
bullseye0.74-1+deb11u2fixed
bullseye (security)0.74-1+deb11u1fixed
bookworm0.78-2+deb12u2fixed
bookworm (security)0.78-2+deb12u1fixed
sid, trixie0.82-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
puttysource(unstable)0.57-1

Search for package or bug name: Reporting problems