Lucene search

K
debianDebianDEBIAN:DLA-173-1:1CF51
HistoryMar 15, 2015 - 6:12 p.m.

[SECURITY] [DLA 173-1] putty security update

2015-03-1518:12:02
lists.debian.org
10

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

5.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Package : putty
Version : 0.60+2010-02-20-1+squeeze3
CVE ID : CVE-2015-2157
Debian Bug : 779488

MATTA-2015-002

Florent Daigniere discovered that PuTTY did not enforce an
acceptable range for the Diffie-Hellman server value, as required by
RFC 4253, potentially allowing an eavesdroppable connection to be
established in the event of a server weakness.

#779488
CVE-2015-2157

Patrick Coleman discovered that PuTTY did not clear SSH-2 private
key information from memory when loading and saving key files, which
could result in disclosure of private key material.


Colin Watson [[email protected]]
Attachment:
signature.asc
Description: Digital signature

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

5.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%