CVE-2015-2157

The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.1 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
VendorProductVersion
debiandebian_linux
7.0
opensuseopensuse
13.1
opensuseopensuse
13.2
puttyputty
0.51
puttyputty
0.52
puttyputty
0.53b:b
puttyputty
0.54
puttyputty
0.55
puttyputty
0.56
puttyputty
0.57
puttyputty
0.58
puttyputty
0.59
puttyputty
0.60
puttyputty
0.61
puttyputty
0.62
puttyputty
0.63
simon_tathamputty
0.53
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
putty
bullseye
0.74-1+deb11u2
fixed
bullseye (security)
0.74-1+deb11u1
fixed
bookworm
0.78-2+deb12u2
fixed
bookworm (security)
0.78-2+deb12u1
fixed
sid
0.81-3
fixed
trixie
0.81-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
putty
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
Fixed 0.63-8ubuntu0.1
released
trusty
Fixed 0.63-4ubuntu0.1
released
precise
ignored
lucid
ignored