Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14002

Опубликовано: 29 июн. 2020
Источник: debian
EPSS Низкий

Описание

PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puttyfixed0.74-1package
puttyno-dsastretchpackage
puttyno-dsajessiepackage

Примечания

  • Introduced by: https://git.tartarus.org/?p=simon/putty.git;a=commit;h=d21041f7f8846b16ff6d72ed696d6190627e19b4 (0.68)

  • Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commit;h=08f1e2a5066ea95559945af339a60ca14560d764 (0.74)

EPSS

Процентиль: 64%
0.00475
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 5 лет назад

PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

CVSS3: 5.9
nvd
больше 5 лет назад

PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

CVSS3: 5.9
github
больше 3 лет назад

PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

EPSS

Процентиль: 64%
0.00475
Низкий