Description
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-173-1 | putty security update |
Debian DSA |
DSA-3190-1 | putty security update |
EUVD |
EUVD-2015-2266 | The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T05:10:14.276Z
Reserved: 2015-02-28T00:00:00.000Z
Link: CVE-2015-2157
No data.
Status : Deferred
Published: 2015-03-27T14:59:05.697
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-2157
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD