[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3190-1 putty -- putty

ID: oval:org.secpod.oval:def:601981Date: (C)2015-03-20   (M)2023-03-24
Class: PATCHFamily: unix




Patrick Coleman discovered that the Putty SSH client failed to wipe out unused sensitive memory. In addition Florent Daigniere discovered that exponential values in Diffie Hellman exchanges were insufficienty restricted.

Platform:
Debian 7.0
Product:
putty
Reference:
DSA-3190-1
CVE-2015-2157
CVE    1
CVE-2015-2157
CPE    2
cpe:/o:debian:debian_linux:7.x
cpe:/a:putty:putty

© SecPod Technologies