CVE-2015-2157
27.03.2015, 14:59
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.Enginsight
| Vendor | Product | Version |
|---|---|---|
| debian | debian_linux | 7.0 |
| opensuse | opensuse | 13.1 |
| opensuse | opensuse | 13.2 |
| putty | putty | 0.51 |
| putty | putty | 0.52 |
| putty | putty | 0.53b:b |
| putty | putty | 0.54 |
| putty | putty | 0.55 |
| putty | putty | 0.56 |
| putty | putty | 0.57 |
| putty | putty | 0.58 |
| putty | putty | 0.59 |
| putty | putty | 0.60 |
| putty | putty | 0.61 |
| putty | putty | 0.62 |
| putty | putty | 0.63 |
| simon_tatham | putty | 0.53 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References