CVE-2011-4607
Published: 23 August 2013
PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.
Priority
Status
Package | Release | Status |
---|---|---|
putty Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(0.62-1ubuntu1)
|
|
quantal |
Not vulnerable
(0.62-1ubuntu1)
|
|
raring |
Not vulnerable
(0.62-1ubuntu1)
|
|
upstream |
Released
(0.62)
|
|
Patches: upstream: http://svn.tartarus.org/sgt?view=rev&revision=9357 |