FreeBSD : PuTTY -- Four security holes in versions before 0.63 (4b448a96-ff73-11e2-b28d-080027ef73ec)

medium Nessus Plugin ID 69250

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Simon Tatham reports :

This [0.63] release fixes multiple security holes in previous versions of PuTTY, which can allow an SSH-2 server to make PuTTY overrun or underrun buffers and crash. [...]

These vulnerabilities can be triggered before host key verification, which means that you are not even safe if you trust the server you think you're connecting to, since it could be spoofed over the network and the host key check would not detect this before the attack could take place.

Additionally, when PuTTY authenticated with a user's private key, the private key or information equivalent to it was accidentally kept in PuTTY's memory for the rest of its run, where it could be retrieved by other processes reading PuTTY's memory, or written out to swap files or crash dumps. This release fixes that as well.

Solution

Update the affected package.

See Also

https://lists.tartarus.org/pipermail/putty-announce/2013/000018.html

http://www.nessus.org/u?c3596240

http://www.nessus.org/u?8a13ea52

http://www.nessus.org/u?c6c65842

http://www.nessus.org/u?84700181

http://www.nessus.org/u?c4e0284f

Plugin Details

Severity: Medium

ID: 69250

File Name: freebsd_pkg_4b448a96ff7311e2b28d080027ef73ec.nasl

Version: 1.6

Type: local

Published: 8/8/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:putty, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/7/2013

Vulnerability Publication Date: 7/8/2013

Reference Information

CVE: CVE-2013-4206, CVE-2013-4207, CVE-2013-4208, CVE-2013-4852