Vulnerability Description
PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets, which allows attackers to listen on the same port to steal an incoming connection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Putty | Putty | < 0.73 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://lists.tartarus.org/pipermail/putty-announce/2019/000029.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20191127-0003/
- https://lists.tartarus.org/pipermail/putty-announce/2019/000029.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20191127-0003/
FAQ
What is CVE-2019-17067?
CVE-2019-17067 is a vulnerability with a CVSS score of 9.8 (CRITICAL). PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets, which allows attackers to listen on the same port to steal an incoming connection.
How severe is CVE-2019-17067?
CVE-2019-17067 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17067?
Check the references section above for vendor advisories and patch information. Affected products include: Putty Putty, Microsoft Windows.