The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2013-08/msg00035.html - | |
References | () http://secunia.com/advisories/54379 - Vendor Advisory | |
References | () http://secunia.com/advisories/54533 - | |
References | () http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html - | |
References | () http://www.debian.org/security/2013/dsa-2736 - | |
References | () http://www.openwall.com/lists/oss-security/2013/08/06/11 - |
Information
Published : 2013-08-19 23:55
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4208
Mitre link : CVE-2013-4208
CVE.ORG link : CVE-2013-4208
JSON object : View
Products Affected
simon_tatham
- putty
putty
- putty
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor