First published: Tue Oct 01 2019(Updated: )
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PuTTY | <0.73 | |
openSUSE | =15.0 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17068 is a vulnerability in PuTTY versions before 0.73 that mishandles the "bracketed paste mode" protection mechanism, allowing a session to be affected by malicious clipboard content.
CVE-2019-17068 has a severity rating of 7.5, which is considered high.
PuTTY versions before 0.73 are affected by CVE-2019-17068, as well as openSUSE Leap 15.0 and 15.1.
To fix CVE-2019-17068, you should update PuTTY to version 0.73 or later.
You can find more information about CVE-2019-17068 at the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html).