First published: Fri Aug 23 2013(Updated: )
PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PuTTY | =0.59 | |
PuTTY | =0.60 | |
PuTTY | =0.61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4607 has been classified as a moderate severity vulnerability due to its potential for local users to read sensitive information.
To fix CVE-2011-4607, upgrade to a version of PuTTY higher than 0.61 that does not have this vulnerability.
CVE-2011-4607 affects PuTTY versions 0.59, 0.60, and 0.61.
CVE-2011-4607 is a memory management vulnerability that could lead to sensitive information leakage.
No, CVE-2011-4607 specifically impacts local users who can access the process memory on affected systems.