Description


PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

Related CPE's


Vulnerable

Weaknesses



CWE-345

134c704f-9b21-4f2e-91b3-4a467353bcc0

Secondary

CWE-345

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

8.1 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-07-09T19:15:08.540Z

4 years ago

Last modified

2024-11-21T05:13:36.733Z

1 year ago