CVE-2013-4208

NameCVE-2013-4208
DescriptionThe rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
SourceCVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2736-1
NVD severitylow (attack range: local)
Debian Bugs719070

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
filezilla (PTS)wheezy3.5.3-2vulnerable
jessie3.9.0.5-1fixed
stretch, sid3.15.0.2-1fixed
putty (PTS)wheezy (security), wheezy0.62-9+deb7u3fixed
jessie (security), jessie0.63-10+deb8u1fixed
stretch, sid0.67-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filezillasource(unstable)3.7.3-1low719070
puttysource(unstable)0.63-1low
puttysourcesqueeze0.60+2010-02-20-1+squeeze2lowDSA-2736-1
puttysourcewheezy0.62-9+deb7u1lowDSA-2736-1

Notes

[squeeze] - filezilla <no-dsa> (Minor issue)
[wheezy] - filezilla <no-dsa> (Minor issue)
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html

Search for package or bug name: Reporting problems