[Secure-testing-commits] r52599 - in data: . CVE
Markus Koschany
apo at moszumanska.debian.org
Thu Jun 15 22:00:55 UTC 2017
Author: apo
Date: 2017-06-15 22:00:55 +0000 (Thu, 15 Jun 2017)
New Revision: 52599
Modified:
data/CVE/list
data/dla-needed.txt
Log:
CVE-2017-6542,putty: no-dsa for Wheezy
The issue is only exploitable when SSH agent forwarding is enabled (disabled by
default) AND the attacker has been able to connect to the Unix-domain socket
representing the forwarded agent connection.
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-06-15 21:58:54 UTC (rev 52598)
+++ data/CVE/list 2017-06-15 22:00:55 UTC (rev 52599)
@@ -8995,6 +8995,7 @@
CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...)
- putty 0.67-3 (bug #857642)
[jessie] - putty <no-dsa> (Minor issue)
+ [wheezy] - putty <no-dsa> (Minor issue)
NOTE: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
NOTE: Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8 (0.68)
NOTE: Bug only exploitable if SSH agent forwarding enabled (not the default) and if
Modified: data/dla-needed.txt
===================================================================
--- data/dla-needed.txt 2017-06-15 21:58:54 UTC (rev 52598)
+++ data/dla-needed.txt 2017-06-15 22:00:55 UTC (rev 52599)
@@ -86,12 +86,6 @@
NOTE: 2017-06-01: however I don't know whether pson is the only supported format
NOTE: 2017-06-01: in this older version of puppet. -- lamby at d.o
--
-putty
- NOTE: 2017-04-14: CVE-2017-6542 is only exploitable by a malicious server
- NOTE: with SSH agent forwarding enabled. In this case, the client is in
- NOTE: serious problem anyway. Backporting the fix is non-trivial. Asked the
- NOTE: putty maintainer for help/advice, but no response yet. -- Jonas Meurer
---
qemu (Guido Günther)
--
qemu-kvm (Guido Günther)
More information about the Secure-testing-commits
mailing list