First published: Wed Mar 07 2007(Updated: )
PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PuTTY | <=0.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-7162 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2006-7162, update to a newer version of PuTTY that ensures proper file permissions for private key files and session logs.
PuTTY versions 0.59 and earlier are affected by CVE-2006-7162.
CVE-2006-7162 involves .ppk files containing private keys and session log files created by PuTTY.
Local users on systems with vulnerable versions of PuTTY can be affected by CVE-2006-7162 as they may gain unauthorized access to sensitive information.