Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 69123

Summary: net-misc/putty 0.56 security update
Product: Gentoo Security Reporter: Tobias Sager <moixa>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: taviso
Priority: High    
Version: unspecified   
Hardware: All   
OS: All   
URL: http://www.chiark.greenend.org.uk/~sgtatham/putty/
Whiteboard: B2 [glsa] jaervosz
Package list:
Runtime testing required: ---

Description Tobias Sager 2004-10-27 05:00:54 UTC
<snip>
This is a SECURITY UPDATE. We recommend that _everybody_ upgrade, as
soon as possible.

This version fixes a security hole in previous versions of PuTTY,
which can allow an SSH2 server to attack your client before host key
verification. This means that you are not even safe if you trust the
server you _think_ you're connecting to, since it could be spoofed
over the network and the host key check would not detect this before
the attack could take place. The attack can allow the server to
execute code of its choice on the client.

This vulnerability was found by iDEFENSE, who we expect to release
an advisory on the subject shortly.
</snip>
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2004-10-27 06:02:00 UTC
Travis, please bump to 0.56 asap
Comment 2 Tavis Ormandy (RETIRED) gentoo-dev 2004-10-27 06:40:31 UTC
done
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-10-27 14:57:57 UTC
GLSA 200410-29

Thx for the notification and swift resolution folks.