FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  362708
Date:      2014-07-23
Time:      16:51:38Z
Committer: zi

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
bbd5f486-24f1-11e1-95bc-080027ef73ecPuTTY -- Password vulnerability

Simon Tatham reports:

PuTTY 0.62 fixes a security issue present in 0.59, 0.60 and 0.61. If you log in using SSH-2 keyboard-interactive authentication (which is the usual method used by modern servers to request a password), the password you type was accidentally kept in PuTTY's memory for the rest of its run, where it could be retrieved by other processes reading PuTTY's memory, or written out to swap files or crash dumps.


Discovery 2011-12-10
Entry 2011-12-12
Modified 2013-08-07
putty
ge 0.59 lt 0.62

CVE-2011-4607
http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html
bbd5f486-24f1-11e1-95bc-080027ef73ecPuTTY -- Password vulnerability

Simon Tatham reports:

PuTTY 0.62 fixes a security issue present in 0.59, 0.60 and 0.61. If you log in using SSH-2 keyboard-interactive authentication (which is the usual method used by modern servers to request a password), the password you type was accidentally kept in PuTTY's memory for the rest of its run, where it could be retrieved by other processes reading PuTTY's memory, or written out to swap files or crash dumps.


Discovery 2011-12-10
Entry 2011-12-12
Modified 2013-08-07
putty
ge 0.59 lt 0.62

CVE-2011-4607
http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html
bbd5f486-24f1-11e1-95bc-080027ef73ecPuTTY -- Password vulnerability

Simon Tatham reports:

PuTTY 0.62 fixes a security issue present in 0.59, 0.60 and 0.61. If you log in using SSH-2 keyboard-interactive authentication (which is the usual method used by modern servers to request a password), the password you type was accidentally kept in PuTTY's memory for the rest of its run, where it could be retrieved by other processes reading PuTTY's memory, or written out to swap files or crash dumps.


Discovery 2011-12-10
Entry 2011-12-12
Modified 2013-08-07
putty
ge 0.59 lt 0.62

CVE-2011-4607
http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html