FreeBSD : PuTTY -- Four security holes in versions before 0.63 (4b448a96-ff73-11e2-b28d-080027ef73ec)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Simon Tatham reports :

This [0.63] release fixes multiple security holes in previous versions
of PuTTY, which can allow an SSH-2 server to make PuTTY overrun or
underrun buffers and crash. [...]

These vulnerabilities can be triggered before host key verification,
which means that you are not even safe if you trust the server you
think you're connecting to, since it could be spoofed over the network
and the host key check would not detect this before the attack could
take place.

Additionally, when PuTTY authenticated with a user's private key, the
private key or information equivalent to it was accidentally kept in
PuTTY's memory for the rest of its run, where it could be retrieved by
other processes reading PuTTY's memory, or written out to swap files
or crash dumps. This release fixes that as well.

See also :

http://lists.tartarus.org/pipermail/putty-announce/2013/000018.html
http://www.nessus.org/u?20c27652
http://www.nessus.org/u?e1b0243c
http://www.nessus.org/u?7bdd07a8
http://www.nessus.org/u?4834e145
http://www.nessus.org/u?234cb85b

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 69250 ()

Bugtraq ID:

CVE ID: CVE-2013-4206
CVE-2013-4207
CVE-2013-4208
CVE-2013-4852

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now