On Thu, 22 Aug 2013, John McKown wrote:

Workaround
==========

There is no known workaround at this time.

This had a update notice a week or two ago and was patched
back in July.  I read the changes then, and by and large, the
author (Simon) was doing a code audit with 'coverity' as well
as from external reports, and found some items needing to be
addressed
        
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-signature-stringlen.html

There are more cleanups than those cited

It is not at all clear that there is a working exploit.  Simon
notes:

 We are unaware of any way in which this can lead to remote
code execution, since it will typically overwrite the entire
heap with zeroes and PuTTY is expected to crash almost
immediately.

That part of the prior email extract pulled is simply wrong.
From the primary post

   Package              /     Vulnerable     /            Unaffected

-------------------------------------------------------------------
  1  net-misc/putty                < 0.63                     >= 0.63

There was a formal CVE, which is perhaps less excitable
        http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4852

CVE's tend to lag an update in their issuance

-- Russ herrold
        614 488 6954

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to