aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorMatthias Andree <mandree@FreeBSD.org>2015-03-05 22:10:26 +0000
committerMatthias Andree <mandree@FreeBSD.org>2015-03-05 22:10:26 +0000
commit371c596738ad9def7c25d3d3184315fb2ca72462 (patch)
tree807bfa608cb66f7fb46dd694edd115e3f089ab8f /security
parenta0c547be8786078df896ad087d39f144b29f4ec1 (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index af9dd3223b51..aabecd6eb211 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,44 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="92fc2e2b-c383-11e4-8ef7-080027ef73ec">
+ <topic>PuTTY -- fails to scrub private keys from memory after use</topic>
+ <affects>
+ <package>
+ <name>putty</name>
+ <range><lt>0.64</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Simon Tatham reports:</p>
+ <blockquote cite="http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html">
+ <p>When PuTTY has sensitive data in memory and has no further need for
+ it, it should wipe the data out of its memory, in case malware later
+ gains access to the PuTTY process or the memory is swapped out to
+ disk or written into a crash dump file. An obvious example of this
+ is the password typed during SSH login; other examples include
+ obsolete session keys, public-key passphrases, and the private
+ halves of public keys.</p>
+ <p>PuTTY 0.63 and earlier versions, after loading a private key
+ from a disk file, mistakenly leak a memory buffer containing a
+ copy of the private key, in the function ssh2_load_userkey. The
+ companion function ssh2_save_userkey (only called by PuTTYgen) can
+ also leak a copy, but only in the case where the file it tried to
+ save to could not be created.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html</url>
+ <cvename>CVE-2015-2157</cvename>
+ </references>
+ <dates>
+ <discovery>2015-02-28</discovery>
+ <entry>2015-03-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="8505e013-c2b3-11e4-875d-000c6e25e3e9">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>