CVE-2021-36367

Name
CVE-2021-36367
Description
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
MISC https://git.tartarus.org/?p=simon/putty.git;a=commit;h=1dc5659aa62848f0aeb5de7bd3839fecc7debefa

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:* putty >= None <= 0.75

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
putty 3.14-main 0.76-r0 Jeff Bilyk <jbilyk@alpinelinux.org> fixed
putty 3.13-main 0.76-r0 Jeff Bilyk <jbilyk@alpinelinux.org> fixed
putty 3.12-main 0.76-r0 Jeff Bilyk <jbilyk@alpinelinux.org> fixed
putty 3.11-main 0.76-r0 Jeff Bilyk <jbilyk@alpinelinux.org> fixed
putty 3.15-main 0.76-r0 Jeff Bilyk <jbilyk@alpinelinux.org> fixed
putty 3.16-main 0.76-r0 Jeff Bilyk <jbilyk@alpinelinux.org> fixed