ID CVE-2019-17069
Summary PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.
References
Vulnerable Configurations
  • cpe:2.3:a:putty:putty:-:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:-:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.62:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.62:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.63:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.63:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.65:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.65:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.66:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.66:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.67:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.67:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.67:beta:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.67:beta:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.68:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.68:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.69:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.69:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.70:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.70:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.71:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.71:*:*:*:*:*:*:*
  • cpe:2.3:a:putty:putty:0.72:*:*:*:*:*:*:*
    cpe:2.3:a:putty:putty:0.72:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 31-03-2022 - 17:54)
Impact:
Exploitability:
CWE CWE-416
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm https://security.netapp.com/advisory/ntap-20191127-0003/
misc https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html
suse
  • openSUSE-SU-2019:2276
  • openSUSE-SU-2019:2277
  • openSUSE-SU-2019:2292
Last major update 31-03-2022 - 17:54
Published 01-10-2019 - 17:15
Last modified 31-03-2022 - 17:54
Back to Top