CVE-2013-4208
Gentoo Linux Security Advisory 201309-08
Severity Score
5.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
La función rsa_verify en PuTTY anterior a 0.63 (1) no limpia de memoria los procesos sensibles después de usarlos y (2)no libera determinadas estructuras que contienen procesos sensibles, lo que podría permitir a usuarios locales descubrir claves privadas RSA y DSA.
Multiple vulnerabilities have been found in FileZilla, the worst of which could result in arbitrary code execution. Versions less than 3.7.3 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2013-06-12 CVE Reserved
- 2013-08-12 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/54533 | Third Party Advisory | |
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped.html | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2013/08/06/11 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-08/msg00035.html | 2019-03-21 | |
http://secunia.com/advisories/54379 | 2019-03-21 | |
http://www.debian.org/security/2013/dsa-2736 | 2019-03-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.45 Search vendor "Putty" for product "Putty" and version "0.45" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.46 Search vendor "Putty" for product "Putty" and version "0.46" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.47 Search vendor "Putty" for product "Putty" and version "0.47" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.48 Search vendor "Putty" for product "Putty" and version "0.48" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.49 Search vendor "Putty" for product "Putty" and version "0.49" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.50 Search vendor "Putty" for product "Putty" and version "0.50" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.51 Search vendor "Putty" for product "Putty" and version "0.51" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.52 Search vendor "Putty" for product "Putty" and version "0.52" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.53b Search vendor "Putty" for product "Putty" and version "0.53b" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.54 Search vendor "Putty" for product "Putty" and version "0.54" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.55 Search vendor "Putty" for product "Putty" and version "0.55" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.56 Search vendor "Putty" for product "Putty" and version "0.56" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.57 Search vendor "Putty" for product "Putty" and version "0.57" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.58 Search vendor "Putty" for product "Putty" and version "0.58" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.59 Search vendor "Putty" for product "Putty" and version "0.59" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.60 Search vendor "Putty" for product "Putty" and version "0.60" | - |
Affected
| ||||||
Putty Search vendor "Putty" | Putty Search vendor "Putty" for product "Putty" | 0.61 Search vendor "Putty" for product "Putty" and version "0.61" | - |
Affected
| ||||||
Simon Tatham Search vendor "Simon Tatham" | Putty Search vendor "Simon Tatham" for product "Putty" | <= 0.62 Search vendor "Simon Tatham" for product "Putty" and version " <= 0.62" | - |
Affected
| ||||||
Simon Tatham Search vendor "Simon Tatham" | Putty Search vendor "Simon Tatham" for product "Putty" | 0.53 Search vendor "Simon Tatham" for product "Putty" and version "0.53" | - |
Affected
|