CVE-2013-4208

NameCVE-2013-4208
DescriptionThe rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2736-1
NVD severitylow (attack range: local)
Debian Bugs719070

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
filezilla (PTS)jessie3.9.0.5-1fixed
stretch3.24.0-1fixed
buster, sid3.39.0-2fixed
putty (PTS)jessie0.63-10+deb8u1fixed
jessie (security)0.63-10+deb8u2fixed
stretch (security), stretch0.67-3+deb9u1fixed
buster, sid0.70-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filezillasource(unstable)3.7.3-1low719070
puttysource(unstable)0.63-1low
puttysourcesqueeze0.60+2010-02-20-1+squeeze2lowDSA-2736-1
puttysourcewheezy0.62-9+deb7u1lowDSA-2736-1

Notes

[squeeze] - filezilla <no-dsa> (Minor issue)
[wheezy] - filezilla <no-dsa> (Minor issue)
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html

Search for package or bug name: Reporting problems