#VU21599 Permissions, Privileges, and Access Controls in PuTTY


Published: 2019-10-07

Vulnerability identifier: #VU21599

Vulnerability risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17067

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
PuTTY
Client/Desktop applications / Software for system administration

Vendor: Simon Tatham

Description

The vulnerability allows a local user to tamper with application connection.

The vulnerability exists due to PuTTY when installed on Windows OS improperly opens port-forwarding listening sockets. A local user can listen on the same port and intercept all incoming connection packets.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

PuTTY: 0.45 - 0.72


External links
http://lists.tartarus.org/pipermail/putty-announce/2019/000029.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability