10a472aa72
- Vulnerability: non-coprime values in DSA signatures can cause buffer overflow in modular inverse - Vulnerability: buffer underrun in modmul can corrupt the heap - Vulnerability: negative string length in public-key signatures can cause integer overflow and overwrite all of memory - Private keys left in memory after being used by PuTTY tools N.B. some of these vulnerabilities where an SSH-2 server can make PuTTY overrun or underrun buffers can be triggered *before* host key verification so there is a risk from a spoofed server. For more info see the 0.63 section of http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/ |
||
---|---|---|
.. | ||
patches | ||
pkg | ||
distinfo | ||
Makefile |