Description
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Published: 2015-03-27
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-173-1 putty security update
Debian DSA Debian DSA DSA-3190-1 putty security update
EUVD EUVD EUVD-2015-2266 The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
History

No history.

Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Opensuse Opensuse
Putty Putty
Simon Tatham Putty
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T05:10:14.276Z

Reserved: 2015-02-28T00:00:00.000Z

Link: CVE-2015-2157

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-03-27T14:59:05.697

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-2157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses