First published: Thu Mar 21 2019(Updated: )
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
PuTTY | <0.71 | |
Microsoft Windows | ||
openSUSE Backports | =15.0 | |
openSUSE | =15.0 | |
PuTTY | <0.71 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9896 is a vulnerability in PuTTY versions before 0.71 on Windows that allows local attackers to hijack the application by placing a malicious help file in the same directory as the executable.
CVE-2019-9896 has a severity value of 7.8, which is considered high.
PuTTY versions before 0.71 on Windows are affected by CVE-2019-9896.
This vulnerability can be exploited by local attackers placing a malicious help file in the same directory as the PuTTY executable.
Yes, you can refer to the following sources for more information: http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00004.html, http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00020.html, https://security.netapp.com/advisory/ntap-20190404-0001/