Download
| Alert*
oval:org.secpod.oval:def:74488
The host is installed with Putty through 0.75 and is prone to an insufficient verification of data authenticity vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SSH session. Successful exploitation allows an attacker to capture credential data, and ... oval:org.secpod.oval:def:612881 Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol is prone to a prefix truncation attack, known as the Terrapin attack. This attack allows a MITM attacker to effect a limited break of the integrity of the early encrypted SSH transport protocol by sending extra messa ... oval:org.secpod.oval:def:96941 Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol is prone to a prefix truncation attack, known as the Terrapin attack. This attack allows a MITM attacker to effect a limited break of the integrity of the early encrypted SSH transport protocol by sending extra messa ... |