WinSCP Integer Overflow Vulnerability (Windows)

Summary
The host is installed with WinSCP and is prone to integer overflow vulnerability.
Impact
Successful exploitation will allow attackers to cause heap-based buffer overflows, resulting in a denial of service or potentially allowing the execution of arbitrary code.
Solution
Upgrade to version 5.1.6 or later, For updates refer to http://winscp.net
Insight
Flaw is due to improper validation of message lengths in the getstring() function in sshrsa.c and sshdss.c when handling negative SSH handshake.
Affected
WinSCP version before 5.1.6 on Windows
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References