CVE-2013-4208

NameCVE-2013-4208
DescriptionThe rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2736-1
NVD severitylow (attack range: local)
Debian Bugs719070
Debian/oldstablepackage filezilla is vulnerable.
Debian/stablepackage filezilla is vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
filezilla (PTS)squeeze3.3.3-1vulnerable
wheezy3.5.3-2vulnerable
sid, jessie3.9.0.5-1fixed
putty (PTS)squeeze (security), squeeze0.60+2010-02-20-1+squeeze2fixed
squeeze (lts)0.60+2010-02-20-1+squeeze3fixed
wheezy0.62-9+deb7u1fixed
wheezy (security)0.62-9+deb7u2fixed
sid, jessie0.63-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filezillasource(unstable)3.7.3-1low719070
puttysource(unstable)0.63-1low
puttysourcesqueeze0.60+2010-02-20-1+squeeze2lowDSA-2736-1
puttysourcewheezy0.62-9+deb7u1lowDSA-2736-1

Notes

[squeeze] - filezilla <no-dsa> (Minor issue)
[wheezy] - filezilla <no-dsa> (Minor issue)
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html

Search for package or bug name: Reporting problems