FreeBSD : putty -- buffer overflow vulnerability in ssh2 support (19518d22-2d05-11d9-8943-0050fc56d258)

high Nessus Plugin ID 37021

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

There is a bug in SSH2 support that allows a server to execute malicious code on a connecting PuTTY client. This attack can be performed before host key verification happens, so a different machine
-- man in the middle attack -- could fake the machine you are connecting to.

Solution

Update the affected package.

See Also

https://marc.info/?l=bugtraq&m=109890310929207

https://security.gentoo.org/glsa/200410-29

http://www.nessus.org/u?97562c3d

http://www.nessus.org/u?e16fa5e3

Plugin Details

Severity: High

ID: 37021

File Name: freebsd_pkg_19518d222d0511d989430050fc56d258.nasl

Version: 1.15

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:putty, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/4/2004

Vulnerability Publication Date: 10/26/2004