Search for packages
Package details: pkg:deb/ubuntu/putty@0.60-2
purl pkg:deb/ubuntu/putty@0.60-2
Next non-vulnerable version 0.73-1
Latest non-vulnerable version 0.73-1
Risk 10.0
Vulnerabilities affecting this package (11)
Vulnerability Summary Fixed by
VCID-1tty-pj8p-aaan
Aliases:
CVE-2016-2563
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
0.67-1
Affected by 7 other vulnerabilities.
VCID-578f-zwyb-aaac
Aliases:
CVE-2019-17068
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
0.73-1
Affected by 0 other vulnerabilities.
VCID-6un4-nzgb-aaak
Aliases:
CVE-2019-17069
PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.
0.73-1
Affected by 0 other vulnerabilities.
VCID-6xap-we19-aaaq
Aliases:
CVE-2015-5309
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
0.66-1
Affected by 8 other vulnerabilities.
VCID-9mvm-26fy-aaaf
Aliases:
CVE-2015-2157
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
0.63-4ubuntu0.1
Affected by 9 other vulnerabilities.
0.64-1
Affected by 9 other vulnerabilities.
VCID-ah15-cney-aaaa
Aliases:
CVE-2019-9895
In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding.
0.70-6
Affected by 2 other vulnerabilities.
VCID-fv5j-z33q-aaap
Aliases:
CVE-2019-9898
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
0.70-6
Affected by 2 other vulnerabilities.
VCID-mjdj-hpjv-aaaj
Aliases:
CVE-2019-9894
A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.
0.70-6
Affected by 2 other vulnerabilities.
VCID-t391-f1q1-aaap
Aliases:
CVE-2019-9897
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.
0.70-6
Affected by 2 other vulnerabilities.
VCID-vspg-9eep-aaae
Aliases:
CVE-2013-4852
Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.
0.63-1
Affected by 10 other vulnerabilities.
VCID-yfyf-tvd9-aaan
Aliases:
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
0.70-4
Affected by 6 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version