TL;DR >> Go straight to the report
Time to update your PuTTY installations immediately to the latest version. Why the urgency? The popular SSH client program has released the latest version of its software that includes security patches for 8 security flaws.
PuTTY is one of the most popular used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols.
Almost 20 months after releasing the last version of its software, the developers of PuTTY earlier this week released the latest version 0.71 for Windows and Unix operating systems.
As mentioned on their website, all previous versions of the PuTTY software have been found vulnerable to multiple security vulnerabilities that could allow a malicious server or a compromised server to hijack
The known vulnerabilities are:
- vuln-auth-prompt-spoofing (fixed in release 0.71)
- vuln-chm-hijack (fixed in release 0.71)
- vuln-fd-set-overflow (fixed in release 0.71)
- vuln-rng-reuse (fixed in release 0.71)
- vuln-rsa-kex-integer-overflow (fixed in release 0.71)
- vuln-terminal-dos-combining-chars (fixed in release 0.71)
- vuln-terminal-dos-combining-chars-double-width-gtk (fixed in release 0.71)
- vuln-terminal-dos-one-column-cjk (fixed in release 0.71)
Get A Report of All Vulnerable PuTTY Installations
Our custom color-coded report can tell you in no time which devices have a vulnerable PuTTY version in place and need to be patched. If you haven't already, start your free Lansweeper trial and get a list of all vulnerable PuTTY versions in no time.