Loading
Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.
Use Putty vendor hub and Putty product page to widen CVE-2004-1008 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-17067, CVE-2019-9898 and CVE-2021-36367 for nearby disclosures in the same product family.