The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2736-1 | putty security update |
EUVD |
EUVD-2013-4113 | The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:38:01.962Z
Reserved: 2013-06-12T00:00:00
Link: CVE-2013-4208
No data.
Status : Deferred
Published: 2013-08-19T23:55:08.833
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-4208
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD