PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2011/q4/499 - | |
References | () http://seclists.org/oss-sec/2011/q4/500 - | |
References | () http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html - Vendor Advisory |
Information
Published : 2013-08-23 16:55
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4607
Mitre link : CVE-2011-4607
CVE.ORG link : CVE-2011-4607
JSON object : View
Products Affected
putty
- putty
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer