FreeBSD : putty -- buffer overflow vulnerability in ssh2 support (159)

This script is Copyright (C) 2009-2010 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a security update

Description :

The following package needs to be updated: putty

See also :

http://bugs.horde.org/ticket/?id=4513
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=482
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=564
http://secunia.com/advisories/32200/
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ssh2-debug.html
http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml
http://www.mozilla.org/security/announce/2007/mfsa2007-01.html
http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
http://www.opera.com/support/search/view/861/
http://www.FreeBSD.org/ports/portaudit/19518d22-2d05-11d9-8943-0050fc56d258.html

Solution :

Update the package on the remote host

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 15809 (freebsd_putty_056.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now