CVE-2013-4208

The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.1 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
VendorProductVersion
puttyputty
0.45
puttyputty
0.46
puttyputty
0.47
puttyputty
0.48
puttyputty
0.49
puttyputty
0.50
puttyputty
0.51
puttyputty
0.52
puttyputty
0.53b:b
puttyputty
0.54
puttyputty
0.55
puttyputty
0.56
puttyputty
0.57
puttyputty
0.58
puttyputty
0.59
puttyputty
0.60
puttyputty
0.61
simon_tathamputty
𝑥
≤ 0.62
simon_tathamputty
0.53
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
filezilla
bullseye
3.52.2-3+deb11u1
fixed
squeeze
no-dsa
wheezy
no-dsa
bookworm
3.63.0-1+deb12u3
fixed
sid
3.68.0-1
fixed
trixie
3.68.0-1
fixed
putty
bullseye
0.74-1+deb11u2
fixed
squeeze
no-dsa
wheezy
no-dsa
bullseye (security)
0.74-1+deb11u1
fixed
bookworm
0.78-2+deb12u2
fixed
bookworm (security)
0.78-2+deb12u1
fixed
sid
0.81-3
fixed
trixie
0.81-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
putty
raring
Fixed 0.62-10ubuntu0.1
released
quantal
Fixed 0.62-9ubuntu0.1
released
precise
Fixed 0.62-6ubuntu0.1
released
lucid
ignored