Vulnerability Description
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Putty | Putty | < 0.73 |
| Opensuse | Leap | 15.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.htmlThird Party Advisory
- https://lists.tartarus.org/pipermail/putty-announce/2019/000029.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20191127-0003/
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.htmlThird Party Advisory
- https://lists.tartarus.org/pipermail/putty-announce/2019/000029.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20191127-0003/
FAQ
What is CVE-2019-17068?
CVE-2019-17068 is a vulnerability with a CVSS score of 7.5 (HIGH). PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
How severe is CVE-2019-17068?
CVE-2019-17068 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17068?
Check the references section above for vendor advisories and patch information. Affected products include: Putty Putty, Opensuse Leap.