Lucene search

K
gentooGentoo FoundationGLSA-202407-11
HistoryJul 05, 2024 - 12:00 a.m.

PuTTY: Multiple Vulnerabilities

2024-07-0500:00:00
Gentoo Foundation
security.gentoo.org
11
putty
telnet
ssh
windows
unix
terminal emulator
vulnerabilities
cve
upgrade
keys

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

10

Confidence

High

EPSS

0.965

Percentile

99.6%

Background

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator.

Description

Multiple vulnerabilities have been discovered in PuTTY. Please review the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All PuTTY users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/putty-0.81"

In addition, any keys generated with PuTTY versions 0.68 to 0.80 should be considered breached and should be regenerated.

OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/putty< 0.81UNKNOWN

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

10

Confidence

High

EPSS

0.965

Percentile

99.6%