Vulnerability CVE-2015-2157


Published: 2015-03-27

Description:
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

See advisories in our WLB2 database:
Topic
Author
Date
Low
PuTTY fails to clear private key information from memory
Patrick Coleman
02.03.2015

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Simon tatham -> Putty 
Putty -> Putty 
Opensuse -> Opensuse 
Novell -> Opensuse 
Greenend -> Putty 
Fedoraproject -> Fedora 
Debian -> Debian linux 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151790.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151839.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151933.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00032.html
http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html
http://www.debian.org/security/2015/dsa-3190
http://www.openwall.com/lists/oss-security/2015/02/28/4
http://www.openwall.com/lists/oss-security/2015/02/28/5
http://www.securityfocus.com/bid/72825

Copyright 2024, cxsecurity.com

 

Back to Top