Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4208

Опубликовано: 19 авг. 2013
Источник: debian
EPSS Низкий

Описание

The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puttyfixed0.63-1package
filezillafixed3.7.3-1package
filezillano-dsasqueezepackage
filezillano-dsawheezypackage

Примечания

  • http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html

EPSS

Процентиль: 20%
0.00063
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.

nvd
больше 12 лет назад

The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.

github
больше 3 лет назад

The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.

EPSS

Процентиль: 20%
0.00063
Низкий