|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2016-0112|
|Summary:||Mageia Linux Local Security Checks mgasa-2016-0112|
Mageia Linux Local Security Checks mgasa-2016-0112
Updated putty package fixes security vulnerability: Many versions of PSCP in PuTTY prior to 0.67 have a stack corruption vulnerability in their treatment of the 'sink' direction (i.e. downloading from server to client) of the old-style SCP protocol. In order for this vulnerability to be exploited, the user must connect to a malicious server and attempt to download any file (CVE-2016-2563). The putty package has been updated to version 0.67 to fix this issue and a few other bugs. The halibut package has been updated to version 1.1 to build the documentation.
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2016-2563|
BugTraq ID: 84296
SuSE Security Announcement: openSUSE-SU-2016:1453 (Google Search)
|Copyright||Copyright (C) 2016 Eero Volotinen|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.