CVE-2015-2157
27.03.2015, 14:59
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 7.0 |
opensuse | opensuse | 13.1 |
opensuse | opensuse | 13.2 |
putty | putty | 0.51 |
putty | putty | 0.52 |
putty | putty | 0.53b:b |
putty | putty | 0.54 |
putty | putty | 0.55 |
putty | putty | 0.56 |
putty | putty | 0.57 |
putty | putty | 0.58 |
putty | putty | 0.59 |
putty | putty | 0.60 |
putty | putty | 0.61 |
putty | putty | 0.62 |
putty | putty | 0.63 |
simon_tatham | putty | 0.53 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References