PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets, which allows attackers to listen on the same port to steal an incoming connection.
References
Link | Resource |
---|---|
https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20191127-0003/ | |
https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20191127-0003/ |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20191127-0003/ - |
Information
Published : 2019-10-01 17:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17067
Mitre link : CVE-2019-17067
CVE.ORG link : CVE-2019-17067
JSON object : View
Products Affected
microsoft
- windows
putty
- putty
CWE
CWE-770
Allocation of Resources Without Limits or Throttling