CVE-2019-9898

Name
CVE-2019-9898
Description
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Third Party Advisory http://www.securityfocus.com/bid/107523
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LDO3F267P347E6U2IILFCYW7JPTLCCES/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36LWQ3NPFIV7DC7TC4KFPRYRH2OR7SZ2/
Patch https://security.netapp.com/advisory/ntap-20190401-0002/
Broken Link https://security.netapp.com/advisory/ntap-20190329-0002/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00004.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00020.html
Mailing List https://seclists.org/bugtraq/2019/Apr/6
Third Party Advisory https://www.debian.org/security/2019/dsa-4423
Mailing List https://lists.debian.org/debian-lts-announce/2019/04/msg00023.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:* putty >= None < 0.71

Vulnerable and fixed packages

Source package Branch Version Maintainer Status