FreeBSD : PuTTY -- fails to scrub private keys from memory after use (92fc2e2b-c383-11e4-8ef7-080027ef73ec)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Simon Tatham reports :

When PuTTY has sensitive data in memory and has no further need for
it, it should wipe the data out of its memory, in case malware later
gains access to the PuTTY process or the memory is swapped out to disk
or written into a crash dump file. An obvious example of this is the
password typed during SSH login; other examples include obsolete
session keys, public-key passphrases, and the private halves of public
keys.

PuTTY 0.63 and earlier versions, after loading a private key from a
disk file, mistakenly leak a memory buffer containing a copy of the
private key, in the function ssh2_load_userkey. The companion function
ssh2_save_userkey (only called by PuTTYgen) can also leak a copy, but
only in the case where the file it tried to save to could not be
created.

See also :

http://www.nessus.org/u?df5e80bf
http://www.nessus.org/u?158ed6d5

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 2.1
(CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 81659 ()

Bugtraq ID:

CVE ID: CVE-2015-2157

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now