TRY NOW
News

PuTTY Software Update Patches 8 Important Vulnerabilities

2 min. read
20/03/2019
By Nils Macharis
PuTTy Releases Fix for 8 Security Flaws

TL;DR >> Go straight to the report

Time to update your PuTTY installations immediately to the latest version. Why the urgency? The popular SSH client program has released the latest version of its software that includes security patches for 8 security flaws.

PuTTY is one of the most popular used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols.

Almost 20 months after releasing the last version of its software, the developers of PuTTY earlier this week released the latest version 0.71 for Windows and Unix operating systems.

As mentioned on their website, all previous versions of the PuTTY software have been found vulnerable to multiple security vulnerabilities that could allow a malicious server or a compromised server to hijack client’s system in different ways.

The known vulnerabilities are:

  • vuln-auth-prompt-spoofing (fixed in release 0.71)
  • vuln-chm-hijack (fixed in release 0.71)
  • vuln-fd-set-overflow (fixed in release 0.71)
  • vuln-rng-reuse (fixed in release 0.71)
  • vuln-rsa-kex-integer-overflow (fixed in release 0.71)
  • vuln-terminal-dos-combining-chars (fixed in release 0.71)
  • vuln-terminal-dos-combining-chars-double-width-gtk (fixed in release 0.71)
  • vuln-terminal-dos-one-column-cjk (fixed in release 0.71)

Get A Report of All Vulnerable PuTTY Installations

Our custom color-coded report can tell you in no time which devices have a vulnerable PuTTY version in place and need to be patched. If you haven’t already, start your free Lansweeper trial and get a list of all vulnerable PuTTY versions in no time.

NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.