ID CVE-2019-9894
Summary A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.
References
Vulnerable Configurations
  • cpe:2.3:a:putty:putty:-:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:-:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.62:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.62:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.63:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.63:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.65:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.65:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.66:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.66:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.67:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.67:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.68:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.68:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.69:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.69:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.70:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.70:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 26-04-2019 - 15:43)
Impact:
Exploitability:
CWE CWE-320
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:P
refmap via4
bugtraq 20190403 [SECURITY] [DSA 4423-1] putty security update
confirm https://security.netapp.com/advisory/ntap-20190404-0001/
debian DSA-4423
fedora
  • FEDORA-2019-5776dfe300
  • FEDORA-2019-9e1a1cd634
misc https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
mlist [debian-lts-announce] 20190424 [SECURITY] [DLA 1763-1] putty security update
suse
  • openSUSE-SU-2019:1113
  • openSUSE-SU-2019:1123
Last major update 26-04-2019 - 15:43
Published 21-03-2019 - 16:01
Last modified 26-04-2019 - 15:43
Back to Top