Vulnerability Details : CVE-2021-33500
PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs on Linux or other platforms for similar reasons.
Vulnerability category: Denial of service
Products affected by CVE-2021-33500
- cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33500
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33500
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
MITRE | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
References for CVE-2021-33500
-
https://docs.ssh-mitm.at/puttydos.html
SSH-MITM Docs - PuTTY < v0.75 DoSExploit;Third Party Advisory
-
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
PuTTY Change LogRelease Notes;Third Party Advisory
-
https://github.com/ssh-mitm/ssh-mitm-plugins/blob/main/ssh_mitm_plugins/ssh/putty_dos.py
ssh-mitm-plugins/putty_dos.py at main · ssh-mitm/ssh-mitm-plugins · GitHubExploit;Third Party Advisory
Jump to