FreeBSD : PuTTY -- security fixes in new release (46e1ece5-48bd-11e9-9c40-080027ac955c)

high Nessus Plugin ID 122884

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The PuTTY team reports :

New in 0.71 :

- Security fixes found by an EU-funded bug bounty programme :

- + a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification

- + potential recycling of random numbers used in cryptography

- + on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding

- + multiple denial-of-service attacks that can be triggered by writing to the terminal

- Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels.

- User interface changes to protect against fake authentication prompts from a malicious server.

Solution

Update the affected packages.

See Also

https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

http://www.nessus.org/u?547d4d7f

Plugin Details

Severity: High

ID: 122884

File Name: freebsd_pkg_46e1ece548bd11e99c40080027ac955c.nasl

Version: 1.1

Type: local

Published: 3/18/2019

Updated: 3/18/2019

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:putty, p-cpe:/a:freebsd:freebsd:putty-gtk2, p-cpe:/a:freebsd:freebsd:putty-nogtk, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/17/2019

Vulnerability Publication Date: 3/16/2019