The sshagentchannel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-6542.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.67"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.1"
}
]
}
]