Re: Putty 0.56 Security Fix
WinSCP is the most probably vulnerable. I hope I can manage new release tomorrow.
Before posting, please read how to report bug or request support effectively.
Bug reports without an attached log file are usually useless.
So does 3.7 beta use PuTTy 0.56?
The vulnerability specifically exists due to insufficient bounds checking on SSH2_MSG_DEBUG packets. The 'stringlen' parameter is given a user-supplied value by reading in an integer from an offset in the packet data. The 'stringlen' value is incorrectly checked due to signedness issues as seen below.
2004-10-26 ANOTHER SECURITY HOLE, fixed in PuTTY 0.56
PuTTY 0.56, released today, fixes a serious security hole which can allow a server to execute code of its choice on a PuTTY client connecting to it. In SSH2, the attack can be performed before host key verification, meaning that even if you trust the server you think you are connecting to, a different machine could be impersonating it and could launch the attack before you could tell the difference. We recommend everybody upgrade to 0.56 as soon as possible.
That's two really bad holes in three months. I'd like to apologise to all our users for the inconvenience.