PuTTY: Multiple vulnerabilities Multiple vulnerabilities have been found in PuTTY, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. 2016-06-05 2016-06-05 565080 576524 remote 0.67 0.67

PuTTY is a telnet and SSH client.

Multiple vulnerabilities have been discovered in PuTTY. Please review the CVE identifiers referenced below for details.

Stack-based buffer overflow in the SCP command-line utility allows remote servers to execute arbitrary code or cause a denial of service condition via a crafted SCP-SINK file-size response to an SCP download request.

There is no known workaround at this time.

All PuTTY users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/putty-0.67"
CVE-2015-5309 CVE-2016-2563 BlueKnight b-man