[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-14002Date: (C)2020-06-30   (M)2023-12-22


PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.9CVSS Score : 4.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
FEDORA-2020-35442ce9b7
FEDORA-2020-f4dba093f1
https://lists.tartarus.org/pipermail/putty-announce/
https://security.netapp.com/advisory/ntap-20200717-0003/
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/

CPE    1
cpe:/a:putty:putty
CWE    1
CWE-203
OVAL    4
oval:org.secpod.oval:def:63982
oval:org.secpod.oval:def:1801718
oval:org.secpod.oval:def:118442
oval:org.secpod.oval:def:118446
...

© SecPod Technologies