FreeBSD : putty -- pscp/psftp heap corruption vulnerabilities (a413ed94-836e-11d9-a9e7-0001020eed82)

high Nessus Plugin ID 19057

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Simon Tatham reports :

This version fixes a security hole in previous versions of PuTTY, which can allow a malicious SFTP server to attack your client. If you use either PSCP or PSFTP, you should upgrade. Users of the main PuTTY program are not affected. (However, note that the server must have passed host key verification before this attack can be launched, so a man-in-the-middle shouldn't be able to attack you if you're careful.)

Solution

Update the affected package.

See Also

https://lists.tartarus.org/pipermail/putty-announce/2005/000012.html

https://marc.info/?l=bugtraq&m=110902510713763

http://www.nessus.org/u?009f4000

http://www.nessus.org/u?eee581a9

http://www.nessus.org/u?510ec932

Plugin Details

Severity: High

ID: 19057

File Name: freebsd_pkg_a413ed94836e11d9a9e70001020eed82.nasl

Version: 1.20

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:putty, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 2/20/2005

Vulnerability Publication Date: 2/20/2005

Reference Information

CVE: CVE-2005-0467

BID: 12601