Total vulnerabilities in the database
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Software | From | Fixed in |
---|---|---|
fedoraproject / fedora | 22 | 22.x |
debian / debian_linux | 7.0 | 7.0.x |
fedoraproject / fedora | 20 | 20.x |
opensuse / opensuse | 13.1 | 13.1.x |
opensuse / opensuse | 13.2 | 13.2.x |
putty / putty | 0.51 | 0.51.x |
simon_tatham / putty | 0.53 | 0.53.x |
putty / putty | 0.55 | 0.55.x |
putty / putty | 0.53b | 0.53b.x |
putty / putty | 0.52 | 0.52.x |
putty / putty | 0.54 | 0.54.x |
putty / putty | 0.56 | 0.56.x |
putty / putty | 0.57 | 0.57.x |
putty / putty | 0.58 | 0.58.x |
putty / putty | 0.59 | 0.59.x |
putty / putty | 0.60 | 0.60.x |
putty / putty | 0.61 | 0.61.x |
putty / putty | 0.62 | 0.62.x |
putty / putty | 0.63 | 0.63.x |