fkie_cve-2015-2157
Vulnerability from fkie_nvd
Published
2015-03-27 14:59
Modified
2024-11-21 02:26
Severity ?
Summary
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
fedoraproject | fedora | 20 | |
fedoraproject | fedora | 22 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 | |
putty | putty | 0.51 | |
putty | putty | 0.52 | |
putty | putty | 0.53b | |
putty | putty | 0.54 | |
putty | putty | 0.55 | |
putty | putty | 0.56 | |
putty | putty | 0.57 | |
putty | putty | 0.58 | |
putty | putty | 0.59 | |
putty | putty | 0.60 | |
putty | putty | 0.61 | |
putty | putty | 0.62 | |
putty | putty | 0.63 | |
simon_tatham | putty | 0.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "FC082AE0-C49D-4944-BE76-B751DAD1EF84", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*", "matchCriteriaId": "23BAD8E4-2D3A-45EE-A25D-77BD698119BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*", "matchCriteriaId": "8F7716EC-E0F9-4E50-8351-35D2F248B380", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*", "matchCriteriaId": "46C2BD4D-9817-459E-ACF4-9C95233200A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*", "matchCriteriaId": "22EE5957-76F3-4B20-ADE7-E72D1300A3F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*", "matchCriteriaId": "826FA7E4-7F48-4D1C-856C-A965527B0950", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*", "matchCriteriaId": "AA54ADC7-2A36-40DA-8219-DAA31509E534", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*", "matchCriteriaId": "1A14381E-91A1-4902-B409-1281CFA2D561", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*", "matchCriteriaId": "8B33EB10-535F-42F2-8F78-CE128A89447C", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*", "matchCriteriaId": "218F9EAF-C260-43EC-99C4-EFACA9A1DA8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*", "matchCriteriaId": "5966235B-2F1A-45C5-AF65-99FFFE4725DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.62:*:*:*:*:*:*:*", "matchCriteriaId": "B9942BA6-8947-4742-9A38-2E2F2F5DD341", "vulnerable": true }, { "criteria": "cpe:2.3:a:putty:putty:0.63:*:*:*:*:*:*:*", "matchCriteriaId": "811276A3-5FB5-4718-94FF-E9B6503B8ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:simon_tatham:putty:0.53:*:*:*:*:*:*:*", "matchCriteriaId": "129133D1-B374-4743-9F52-27D0A9558D17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory." }, { "lang": "es", "value": "Las funciones (1) ssh2_load_userkey y (2) ssh2_save_userkey en PuTTY 0.51 hasta 0.63 no limpian correctamente las claves privadas SSH-2 de la memoria, lo que permite a usuarios remotos obtener informaci\u00f3n sensible mediante la lectura de la memoria." } ], "id": "CVE-2015-2157", "lastModified": "2024-11-21T02:26:53.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-27T14:59:05.697", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151790.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151839.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151933.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3190" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/02/28/4" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/02/28/5" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151790.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151839.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151933.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/02/28/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/02/28/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72825" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.