Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4607

Опубликовано: 23 авг. 2013
Источник: debian

Описание

PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puttyfixed0.62-1package
puttyfixed0.60+2010-02-20-1+squeeze2squeezepackage

Примечания

  • DSA-2736-1

  • http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html

  • Hardening measure, not a vulnerability

Связанные уязвимости

ubuntu
больше 12 лет назад

PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.

nvd
больше 12 лет назад

PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.

github
больше 3 лет назад

PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.