Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:1113-1

Опубликовано: 02 апр. 2019
Источник: suse-cvrf

Описание

Security update for putty

This update for putty fixes the following issues:

Update to new upstream release 0.71 [boo#1129633]

  • CVE-2019-9894: Fixed a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification potential recycling of random numbers used in cryptography.
  • CVE-2019-9895: Fixed a remotely triggerable buffer overflow in any kind of server-to-client forwarding.
  • CVE-2019-9897: Fixed multiple denial-of-service attacks that can be triggered by writing to the terminal.
  • CVE-2019-9898: Fixed potential recycling of random numbers used in cryptography
  • CVE-2019-9896 (Windows only): Fixed hijacking by a malicious help file in the same directory as the executable
  • Major rewrite of the crypto code to remove cache and timing side channels.

Список пакетов

openSUSE Leap 15.0
putty-0.71-lp150.9.1

Описание

A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.


Затронутые продукты
openSUSE Leap 15.0:putty-0.71-lp150.9.1

Ссылки

Описание

In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding.


Затронутые продукты
openSUSE Leap 15.0:putty-0.71-lp150.9.1

Ссылки

Описание

In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.


Затронутые продукты
openSUSE Leap 15.0:putty-0.71-lp150.9.1

Ссылки

Описание

Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.


Затронутые продукты
openSUSE Leap 15.0:putty-0.71-lp150.9.1

Ссылки

Описание

Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.


Затронутые продукты
openSUSE Leap 15.0:putty-0.71-lp150.9.1

Ссылки