Updated putty and filezilla packages fixes security vulnerability
Publication date: 09 Aug 2013Modification date: 09 Aug 2013
Type: security
Affected Mageia releases : 2 , 3
CVE: CVE-2013-4206 , CVE-2013-4207 , CVE-2013-4208 , CVE-2013-4852
Description
PuTTY versions 0.62 and earlier - as well as all software that integrates these versions of PuTTY - are vulnerable to an integer overflow leading to heap overflow during the SSH handshake before authentication, caused by improper bounds checking of the length parameter received from the SSH server. This allows remote attackers to cause denial of service, and may have more severe impact on the operation of software that uses PuTTY code (CVE-2013-4852). PuTTY versions 0.62 and earlier - as well as all software that integrates these versions of PuTTY - are vulnerable to a heap-corrupting buffer underrun bug in the modmul function which performs modular multiplication (CVE-2013-4206). PuTTY versions 0.62 and earlier - as well as all software that integrates these versions of PuTTY - are vulnerable to a buffer overflow vulnerability in the calculation of modular inverses when verifying a DSA signature (CVE-2013-4207). PuTTY versions 0.62 and earlier - as well as all software that integrates these versions of PuTTY - are vulnerable to private keys left in memory after being used by PuTTY tools (CVE-2013-4208).
References
- https://bugs.mageia.org/show_bug.cgi?id=10925
- http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-modmul.html
- http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-bignum-division-by-zero.html
- http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html
- http://www.openwall.com/lists/oss-security/2013/08/06/13
- http://www.search-lab.hu/advisories/secadv-20130722
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4852
SRPMS
3/core
- putty-0.63-1.mga3
- filezilla-3.7.3-1.mga3
2/core
- putty-0.63-1.mga2
- filezilla-3.7.3-1.mga2