Debian Putty vulnerabilities
30 known vulnerabilities affecting debian/putty.
Total CVEs
30
CISA KEV
0
Public exploits
3
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH7MEDIUM5LOW13
Vulnerabilities
Page 1 of 2
CVE-2026-4115LOWCVSS 6.32026
CVE-2026-4115 [MEDIUM] CVE-2026-4115: putty - A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verif...
A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verify of the file crypto/ecc-ssh.c of the component Ed25519 Signature Handler. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The
debian
CVE-2024-31497MEDIUMCVSS 5.9fixed in filezilla 3.67.0-1 (forky)2024
CVE-2024-31497 [MEDIUM] CVE-2024-31497: filezilla - In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an ...
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable becaus
debian
CVE-2023-48795MEDIUMCVSS 5.9PoCfixed in dropbear 2022.83-1+deb12u1 (bookworm)2023
CVE-2023-48795 [MEDIUM] CVE-2023-48795: dropbear - The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH bef...
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabl
debian
CVE-2021-36367HIGHCVSS 8.1fixed in putty 0.75-3 (bookworm)2021
CVE-2021-36367 [HIGH] CVE-2021-36367: putty - PuTTY through 0.75 proceeds with establishing an SSH session even if it has neve...
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).
Scope: loc
debian
CVE-2021-33500LOWCVSS 7.52021
CVE-2021-33500 [HIGH] CVE-2021-33500: putty - PuTTY before 0.75 on Windows allows remote servers to cause a denial of service ...
PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs on Linux or other platforms for similar reasons.
Scope: local
bookworm:
debian
CVE-2020-14002MEDIUMCVSS 5.9fixed in putty 0.74-1 (bookworm)2020
CVE-2020-14002 [MEDIUM] CVE-2020-14002: putty - PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information ...
PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).
Scope: local
bookworm: resolved (fixed in 0.74-1)
bullseye: resolved (fixed in 0.74-1)
forky: resolved (fixed
debian
CVE-2019-9895CRITICALCVSS 9.8fixed in putty 0.70-6 (bookworm)2019
CVE-2019-9895 [CRITICAL] CVE-2019-9895: putty - In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow ex...
In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding.
Scope: local
bookworm: resolved (fixed in 0.70-6)
bullseye: resolved (fixed in 0.70-6)
forky: resolved (fixed in 0.70-6)
sid: resolved (fixed in 0.70-6)
trixie: resolved (fixed in 0.70-6)
debian
CVE-2019-9898CRITICALCVSS 9.8fixed in putty 0.70-6 (bookworm)2019
CVE-2019-9898 [CRITICAL] CVE-2019-9898: putty - Potential recycling of random numbers used in cryptography exists within PuTTY b...
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
Scope: local
bookworm: resolved (fixed in 0.70-6)
bullseye: resolved (fixed in 0.70-6)
forky: resolved (fixed in 0.70-6)
sid: resolved (fixed in 0.70-6)
trixie: resolved (fixed in 0.70-6)
debian
CVE-2019-17068HIGHCVSS 7.5fixed in putty 0.73-1 (bookworm)2019
CVE-2019-17068 [HIGH] CVE-2019-17068: putty - PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, wh...
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
Scope: local
bookworm: resolved (fixed in 0.73-1)
bullseye: resolved (fixed in 0.73-1)
forky: resolved (fixed in 0.73-1)
sid: resolved (fixed in 0.73-1)
trixie: resolved (fixed in 0.73-1)
debian
CVE-2019-9894HIGHCVSS 7.5fixed in putty 0.70-6 (bookworm)2019
CVE-2019-9894 [HIGH] CVE-2019-9894: putty - A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71...
A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.
Scope: local
bookworm: resolved (fixed in 0.70-6)
bullseye: resolved (fixed in 0.70-6)
forky: resolved (fixed in 0.70-6)
sid: resolved (fixed in 0.70-6)
trixie: resolved (fixed in 0.70-6)
debian
CVE-2019-9897HIGHCVSS 7.5fixed in putty 0.70-6 (bookworm)2019
CVE-2019-9897 [HIGH] CVE-2019-9897: putty - Multiple denial-of-service attacks that can be triggered by writing to the termi...
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.
Scope: local
bookworm: resolved (fixed in 0.70-6)
bullseye: resolved (fixed in 0.70-6)
forky: resolved (fixed in 0.70-6)
sid: resolved (fixed in 0.70-6)
trixie: resolved (fixed in 0.70-6)
debian
CVE-2019-9896LOWCVSS 7.82019
CVE-2019-9896 [HIGH] CVE-2019-9896: putty - In PuTTY versions before 0.71 on Windows, local attackers could hijack the appli...
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2019-17067LOWCVSS 9.82019
CVE-2019-17067 [CRITICAL] CVE-2019-17067: putty - PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets,...
PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets, which allows attackers to listen on the same port to steal an incoming connection.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2019-17069LOWCVSS 7.5fixed in putty 0.73-1 (bookworm)2019
CVE-2019-17069 [HIGH] CVE-2019-17069: putty - PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service ...
PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.
Scope: local
bookworm: resolved (fixed in 0.73-1)
bullseye: resolved (fixed in 0.73-1)
forky: resolved (fixed in 0.73-1)
sid: resolved (fixed in 0.73-1)
trixie: resolved (fixed in 0.73-1)
debian
CVE-2017-6542CRITICALCVSS 9.8PoCfixed in putty 0.67-3 (bookworm)2017
CVE-2017-6542 [CRITICAL] CVE-2017-6542: putty - The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers...
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
Scope: local
bookworm: resolved (fixed in 0.67-3)
bullseye: reso
debian
CVE-2016-2563CRITICALCVSS 9.8PoCfixed in putty 0.67-1 (bookworm)2016
CVE-2016-2563 [CRITICAL] CVE-2016-2563: putty - Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67...
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
Scope: local
bookworm: resolved (fixed in 0.67-1)
bullseye: resolved (fixed in 0.67
debian
CVE-2016-6167LOWCVSS 7.82016
CVE-2016-6167 [HIGH] CVE-2016-6167: putty - Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local us...
Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2015-5309MEDIUMCVSS 4.3fixed in putty 0.66-1 (bookworm)2015
CVE-2015-5309 [MEDIUM] CVE-2015-5309: putty - Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote att...
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
Scope: local
bookworm: resolved (fixed in 0.66-1)
bullseye: resolved (fixed in 0.66-1)
f
debian
CVE-2015-2157LOWCVSS 2.1fixed in putty 0.63-10 (bookworm)2015
CVE-2015-2157 [LOW] CVE-2015-2157: putty - The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 thro...
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Scope: local
bookworm: resolved (fixed in 0.63-10)
bullseye: resolved (fixed in 0.63-10)
forky: resolved (fixed in 0.63-10)
sid: resolved (fixed in 0.6
debian
CVE-2013-4207LOWCVSS 6.8fixed in filezilla 3.7.3-1 (bookworm)2013
CVE-2013-4207 [MEDIUM] CVE-2013-4207: filezilla - Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cau...
Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
Scope: local
bookworm: resolve
debian
1 / 2Next →