Information Disclosure in PuTTY Client through Memory Management Flaws
CVE-2015-2157
Currently unrated
Key Information:
- Vendor
- Fedoraproject
- Vendor
- CVE Published:
- 27 March 2015
Summary
In PuTTY versions 0.51 through 0.63, the functions responsible for loading and saving SSH-2 user keys fail to adequately wipe sensitive private keys from memory. This oversight enables local users to exploit the vulnerability, gaining unauthorized access to sensitive information by reading unencrypted memory. The implications of this vulnerability could lead to serious security breaches, particularly in environments where sensitive private key usage is commonplace. Users of the affected versions should ensure they upgrade to the latest version where this issue is addressed.
References
Timeline
Vulnerability published
Vulnerability Reserved