Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2563

EPSS 28.63% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-2563

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
PuTTY和KiTTY 基于栈的缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PuTTY是软件开发者Simon Tatham所研发的一套免费的Telnet、Rlogin和SSH客户端软件。该软件主要用于对Linux系统进行远程管理。KiTTY是其中的一个版本号且只能用于Windows系统。 PuTTY 0.67之前版本和KiTTY 0.66.6.3及之前版本的SCP command-line功能中存在基于栈的缓冲区溢出漏洞。远程攻击者可借助SCP下载请求的SCP-SINK file-size响应利用该漏洞造成拒绝服务(栈内存损坏)或执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-2563

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-2563

登录查看更多情报信息。

Same Patch Batch · n/a · 2016-04-07 · 36 CVEs total

CVE-2016-0790CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-2510BeanShell 任意命令执行漏洞
CVE-2015-2774Erlang OTP 信息泄露漏洞
CVE-2016-0729Apache Xerces XML Parser库缓冲区错误漏洞
CVE-2016-2086Joyent Node.js 安全漏洞
CVE-2016-2216Joyent Node.js HTTP响应拆分攻击
CVE-2016-2511websvn 跨站脚本漏洞
CVE-2016-0788CloudBees Jenkins CI和LTS 远程代码执行漏洞
CVE-2016-0789CloudBees Jenkins CI和LTS CLI CRLF注入漏洞
CVE-2015-8681Huawei P8和Mate S ovisp驱动程序安全漏洞
CVE-2016-0791CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-0792CloudBees Jenkins CI和LTS 任意代码执行漏洞
CVE-2016-1531Exim Configuration File Path 安全漏洞
CVE-2016-2097Ruby on Rails Action View组件目录遍历漏洞
CVE-2016-2098Ruby on Rails Action Pack 安全漏洞
CVE-2016-2789Citrix Systems XenMobile Server 跨站脚本漏洞
CVE-2016-2851libotr 整数溢出漏洞
CVE-2016-3976SAP NetWeaver AS Java 目录遍历漏洞
CVE-2016-3973SAP NetWeaver AS Java Real-Time Collaboration服务安全漏洞
CVE-2016-1019Adobe Flash Player 安全漏洞

Showing top 20 of 36 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-2563

No comments yet


Leave a comment