The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-173-1 putty security update
Debian DSA Debian DSA DSA-3190-1 putty security update
EUVD EUVD EUVD-2015-2266 The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T05:10:14.276Z

Reserved: 2015-02-28T00:00:00

Link: CVE-2015-2157

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-03-27T14:59:05.697

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-2157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.