Note:
This project will be discontinued after December 13, 2021. [more]
2020-06-29
PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).
Products | Fedora, Oncommand_unified_manager_core_package, Putty |
Type | Information Exposure Through Discrepancy (CWE-203) |
First patch | - None (likely due to unavailable code) |
Links |
• https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JPV4A77EDCT4BTFO5BE26ZH72BG4E5IJ/
• https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26TACCSQYYCPWAJYNAUIXJGZ5RGORJZV/ • https://security.netapp.com/advisory/ntap-20200717-0003/ • https://lists.tartarus.org/pipermail/putty-announce/ • https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html |