The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 up to and including 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fedoraproject fedora 20 |
||
fedoraproject fedora 22 |
||
debian debian linux 7.0 |
||
opensuse opensuse 13.1 |
||
opensuse opensuse 13.2 |
||
putty putty 0.54 |
||
putty putty 0.55 |
||
putty putty 0.62 |
||
putty putty 0.63 |
||
putty putty 0.51 |
||
putty putty 0.52 |
||
putty putty 0.58 |
||
putty putty 0.59 |
||
putty putty 0.56 |
||
putty putty 0.57 |
||
simon tatham putty 0.53 |
||
putty putty 0.53b |
||
putty putty 0.60 |
||
putty putty 0.61 |