Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
Threat-Mapped Scoring
Score: 1.9
Priority: P3 - Important (Medium)
S9 – Sabotage of System/App
S10 – Denial of Service (+0.1 bonus)
EPSS
Score: 0.01136 Percentile:
0.77453
CVSS Scoring
CVSS v2 Score: 6.8
Severity:
Mapped CWE(s)
CWE-119
: Improper Restriction of Operations within the Bounds of a Memory Buffer
All CAPEC(s)
CAPEC-10: Buffer Overflow via Environment Variables