### [CVE-2016-2563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2563) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request. ### POC #### Reference - http://seclists.org/fulldisclosure/2016/Mar/22 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve-