First published: Sat Feb 01 2003(Updated: )
PuTTY 0.53b and earlier does not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PuTTY | =0.53 | |
PuTTY | =0.49 | |
PuTTY | =0.53b | |
PuTTY | =0.48 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0048 is considered a high severity vulnerability due to the potential exposure of sensitive SSH credentials.
To fix CVE-2003-0048, upgrade to PuTTY version 0.54 or later, which addresses the issue of not clearing credentials from memory.
CVE-2003-0048 affects PuTTY versions 0.48, 0.49, 0.53, and 0.53b.
CVE-2003-0048 can lead to the leakage of plaintext SSH credentials, including usernames and passwords stored in memory.
Users of vulnerable versions of PuTTY are primarily affected, especially in environments where memory access can be exploited by attackers.