From owner-freebsd-questions@FreeBSD.ORG Mon Aug 16 23:43:09 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1611516A4CE for ; Mon, 16 Aug 2004 23:43:09 +0000 (GMT) Received: from smtp809.mail.sc5.yahoo.com (smtp809.mail.sc5.yahoo.com [66.163.168.188]) by mx1.FreeBSD.org (Postfix) with SMTP id AE37543D2D for ; Mon, 16 Aug 2004 23:43:08 +0000 (GMT) (envelope-from krinklyfig@spymac.com) Received: from unknown (HELO smogmonster.com) (jtinnin@pacbell.net@64.171.1.210 with login) by smtp809.mail.sc5.yahoo.com with SMTP; 16 Aug 2004 23:43:02 -0000 From: Joshua Tinnin To: freebsd-questions@freebsd.org Date: Mon, 16 Aug 2004 16:43:31 -0700 User-Agent: KMail/1.6.2 References: <20040816225232.20224.qmail@web61302.mail.yahoo.com> In-Reply-To: <20040816225232.20224.qmail@web61302.mail.yahoo.com> MIME-Version: 1.0 Content-Disposition: inline Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Message-Id: <200408161643.31387.krinklyfig@spymac.com> Subject: Re: [OT] Security hole in PuTTY (Windows ssh client) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: krinklyfig@spymac.com List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Aug 2004 23:43:09 -0000 On Monday 16 August 2004 03:52 pm, stheg olloydson wrote: > Hello, > > Sorry for the completely OT post, but I saw two mentions of PuTTY in > one day on the list and assume it must be a popular piece of Windows > software. It is written for *nix and win32, and it has an MIT license. > The SANS Institute "@Risk" newsletter dated 8AUG04 contains > the following item regarding PuTTY: > > 04.31.4 CVE: Not Available > Platform: Third Party Windows Apps > Title: PuTTY Remote Buffer Overflow > Description: PuTTY is a free Telnet and SSH client. It has been > reported that PuTTY is subject to a pre-authentication buffer > overflow that can allow malicious servers to execute code on a client > machine as it attempts to negotiate connection. PuTTY 0.54 and > previous versions are vulnerable. > Ref: > http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10 You forgot to include this (from the link above): *Solution/Vendor Information/Workaround:* PuTTY 0.55 fixes these vulnerabilities. It is available at: http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY maintainers recommend that everybody upgrade to 0.55 as soon as possible. -- The latest PuTTY version in ports is 0.55. - jt