CVE-2013-4207

CVSS V2 Medium 4.3 CVSS V3 None
Description
Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
Overview
  • CVE ID
  • CVE-2013-4207
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2013-08-19T23:55:08
  • Last Modified Date
  • 2021-08-06T16:58:10
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:putty:putty:2010-06-01:r8967:*:*:development_snapshot:*:*:* 1 OR
cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:* 1 OR 0.62
cpe:2.3:a:simon_tatham:putty:0.53:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 06:58:08 Added to TrackCVE
2022-12-01 19:23:34 2013-08-19T23:55Z 2013-08-19T23:55:08 CVE Published Date updated
2022-12-01 19:23:34 2021-08-06T16:58:10 CVE Modified Date updated
2022-12-01 19:23:34 Analyzed Vulnerability Status updated