VYPR
Unrated severityNVD Advisory· Published Mar 27, 2015· Updated May 6, 2026

CVE-2015-2157

CVE-2015-2157

Description

The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Affected products

19
  • Putty/Putty14 versions
    cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*+ 13 more
    • cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.62:*:*:*:*:*:*:*
    • cpe:2.3:a:putty:putty:0.63:*:*:*:*:*:*:*
    • cpe:2.3:a:simon_tatham:putty:0.53:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
    • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.