Vulnerability CVE-2019-17068


Published: 2019-10-01

Description:
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.

Type:

CWE-74

Vendor: Opensuse
Product: LEAP 
Version: 15.1; 15.0;
Vendor: Putty
Product: Putty 
Version:
0.71
0.70
0.69
0.68
0.67
0.66
0.65
0.63
0.62
0.61
0.60
0.59
0.58
0.57
0.56
0.55
0.54
0.53b
0.53
0.52
0.51
0.50
0.49
0.48
0.47
0.46
0.45

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

 References:
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html
https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html

Related CVE
CVE-2019-17069
PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.
CVE-2019-17067
PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets, which allows attackers to listen on the same port to steal an incoming connection.
CVE-2019-9898
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
CVE-2019-9897
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.
CVE-2019-9896
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
CVE-2019-9895
In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding.
CVE-2019-9894
A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forward...

Copyright 2019, cxsecurity.com

 

Back to Top