Lucene search

K
freebsdFreeBSD91955195-9EBB-11EE-BC14-A703705DB3A6
HistoryOct 16, 2023 - 12:00 a.m.

putty -- add protocol extension against 'Terrapin attack'

2023-10-1600:00:00
vuxml.freebsd.org
41
putty
protocol extension
terrapin attack

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

7.4 High

AI Score

Confidence

Low

0.963 High

EPSS

Percentile

99.5%

Simon Tatham reports:

PuTTY version 0.80 [contains] one security fix […] for a newly discovered security issue known as the ‘Terrapin’
attack, also numbered CVE-2023-48795. The issue affects widely-used
OpenSSH extensions to the SSH protocol: the ChaCha20+Poly1305
cipher system, and ‘encrypt-then-MAC’ mode.
In order to benefit from the fix, you must be using a fixed version
of PuTTY and a server with the fix, so that they can agree to
adopt a modified version of the protocol. […]

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchputty< 0.80UNKNOWN
FreeBSDanynoarchputty-nogtk< 0.80UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

7.4 High

AI Score

Confidence

Low

0.963 High

EPSS

Percentile

99.5%