Unspecified vulnerability in PuTTY via user repliesID: oval:org.secpod.oval:def:16586 | Date: (C)2014-01-23 (M)2023-03-24 |
Class: VULNERABILITY | Family: windows |
The host is installed with PuTTY 0.59 through 0.61 and is prone to unspecified vulnerability. The flaw is present in the application, which does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication. Successful exploitation might allow local users to read login passwords by obtaining access to the process' memory.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows 2000 |
Microsoft Windows 7 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Microsoft Windows 8 |
Microsoft Windows Server 2012 |
Microsoft Windows 10 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |