First published: Fri Mar 27 2015(Updated: )
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =22 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Putty Putty | =0.51 | |
Putty Putty | =0.52 | |
Putty Putty | =0.53b | |
Putty Putty | =0.54 | |
Putty Putty | =0.55 | |
Putty Putty | =0.56 | |
Putty Putty | =0.57 | |
Putty Putty | =0.58 | |
Putty Putty | =0.59 | |
Putty Putty | =0.60 | |
Putty Putty | =0.61 | |
Putty Putty | =0.62 | |
Putty Putty | =0.63 | |
Simon Tatham Putty | =0.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.