The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
2015-03-27T14:59:05.697
2025-04-12T10:46:40.837
Deferred
CVSSv2: 2.1 (LOW)
AV:L/AC:L/Au:N/C:P/I:N/A:N
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | debian | debian_linux | 7.0 | Yes |
Operating System | fedoraproject | fedora | 20 | Yes |
Operating System | fedoraproject | fedora | 22 | Yes |
Operating System | opensuse | opensuse | 13.1 | Yes |
Operating System | opensuse | opensuse | 13.2 | Yes |
Application | putty | putty | 0.51 | Yes |
Application | putty | putty | 0.52 | Yes |
Application | putty | putty | 0.53b | Yes |
Application | putty | putty | 0.54 | Yes |
Application | putty | putty | 0.55 | Yes |
Application | putty | putty | 0.56 | Yes |
Application | putty | putty | 0.57 | Yes |
Application | putty | putty | 0.58 | Yes |
Application | putty | putty | 0.59 | Yes |
Application | putty | putty | 0.60 | Yes |
Application | putty | putty | 0.61 | Yes |
Application | putty | putty | 0.62 | Yes |
Application | putty | putty | 0.63 | Yes |
Application | simon_tatham | putty | 0.53 | Yes |