Lucene search

K
freebsdFreeBSDBBD5F486-24F1-11E1-95BC-080027EF73EC
HistoryDec 10, 2011 - 12:00 a.m.

PuTTY -- Password vulnerability

2011-12-1000:00:00
vuxml.freebsd.org
10

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

Simon Tatham reports:

PuTTY 0.62 fixes a security issue present in 0.59, 0.60 and 0.61.
If you log in using SSH-2 keyboard-interactive authentication
(which is the usual method used by modern servers to request a
password), the password you type was accidentally kept in PuTTY’s
memory for the rest of its run, where it could be retrieved by
other processes reading PuTTY’s memory, or written out to swap
files or crash dumps.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchputty= 0.59UNKNOWN
FreeBSDanynoarchputty< 0.62UNKNOWN

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%