7 Commits

Author SHA1 Message Date
sthen
7070876d4d security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]

plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
2016-03-05 12:58:20 +00:00
sthen
8254c98c8a SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
2015-11-07 17:46:06 +00:00
sthen
7f12da1222 update to PuTTY-0.65 2015-09-12 20:22:35 +00:00
sthen
91f106609c security update to PuTTY 0.64
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html
2015-03-24 16:43:48 +00:00
sthen
10a472aa72 SECURITY update to PuTTY 0.63 - ok brad@
- Vulnerability: non-coprime values in DSA signatures can cause buffer
overflow in modular inverse
- Vulnerability: buffer underrun in modmul can corrupt the heap
- Vulnerability: negative string length in public-key signatures can
cause integer overflow and overwrite all of memory
- Private keys left in memory after being used by PuTTY tools

N.B. some of these vulnerabilities where an SSH-2 server can make PuTTY
overrun or underrun buffers can be triggered *before* host key verification
so there is a risk from a spoofed server. For more info see the 0.63
section of http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/
2013-08-07 11:47:51 +00:00
brad
73958da403 Update to PuTTY 0.62.
ok djm@
2013-01-13 10:12:52 +00:00
djm
adf1096a03 initial import of putty-0.60 SSH/telnet client:
PuTTY is a SSH and Telnet client implementation. This package
    contains the command-line clients and supporting utilities for
    key generation.

feedback steven@ mbalmer@; ok mbalmer@
2007-09-04 09:14:00 +00:00