Source: putty Version: 0.62-9 Severity: important Tags: security upstream patch fixed-upstream
Hi, the following vulnerability was published for putty. CVE-2016-2563[0]: buffer overrun in the old-style SCP protocol If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-2563 [1] http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-pscp-sink-sscanf.html [2] http://tartarus.org/~simon-git/gitweb/?p=putty.git;a=commitdiff;h=bc6c15ab5f636e05b7e91883f0031a7e06117947 Not sure if this warrants a DSA, since it's in the old-style SCP protocol only, and furthermore a user must connect to malicious server where the host key of the server was accepted already. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

