PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).
References
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.tartarus.org/?p=simon/putty.git%3Ba=commit%3Bh=1dc5659aa62848f0aeb5de7bd3839fecc7debefa - | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html - | |
References | () https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html - Release Notes, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5588 - |
25 Apr 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Dec 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-09 21:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36367
Mitre link : CVE-2021-36367
CVE.ORG link : CVE-2021-36367
JSON object : View
Products Affected
putty
- putty
CWE
CWE-345
Insufficient Verification of Data Authenticity