2.1
CVSSv2

CVE-2015-2157

Published: 27/03/2015 Updated: 21/03/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 up to and including 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 20

fedoraproject fedora 22

debian debian linux 7.0

opensuse opensuse 13.1

opensuse opensuse 13.2

putty putty 0.54

putty putty 0.55

putty putty 0.62

putty putty 0.63

putty putty 0.51

putty putty 0.52

putty putty 0.58

putty putty 0.59

putty putty 0.56

putty putty 0.57

simon tatham putty 0.53

putty putty 0.53b

putty putty 0.60

putty putty 0.61

Vendor Advisories

Debian Bug report logs - #779488 putty: CVE-2015-2157 Package: putty; Maintainer for putty is Colin Watson <cjwatson@debianorg>; Source for putty is src:putty (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Sun, 1 Mar 2015 12:30:01 UTC Severity: important Tags: security Found in versi ...