PuTTY 0.59 and earlier uses weak file permissions for (1) ppk files containing private keys generated by puttygen and (2) session logs created by putty, which allows local users to gain sensitive information by reading these files.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=400804 | Patch Vendor Advisory |
http://secunia.com/advisories/24381 | Vendor Advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=400804 | Patch Vendor Advisory |
http://secunia.com/advisories/24381 | Vendor Advisory |
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=400804 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/24381 - Vendor Advisory |
Information
Published : 2007-03-07 21:19
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7162
Mitre link : CVE-2006-7162
CVE.ORG link : CVE-2006-7162
JSON object : View
Products Affected
putty
- putty
CWE