Lucene search

K
mageiaGentoo FoundationMGASA-2015-0442
HistoryNov 11, 2015 - 12:26 a.m.

Updated putty packages fix security vulnerability

2015-11-1100:26:39
Gentoo Foundation
advisories.mageia.org
7

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.021 Low

EPSS

Percentile

89.3%

Versions of PuTTY 0.54 and 0.65 inclusive have a potentially memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence in the terminal emulator (CVE-2015-5309).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchputty< 0.66-1putty-0.66-1.mga5

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.021 Low

EPSS

Percentile

89.3%