Loading
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
Use CWE-119, Putty vendor hub and Putty product page to widen CVE-2017-6542 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-17067, CVE-2019-9898 and CVE-2021-36367 for nearby disclosures in the same product family.