PuTTY Information for VU#888801
SSL/TLS implementations disclose side channel information via PKCS #1 v1.5 version number extension
- Vendor Information Help Date Notified: 18 Apr 2003
- Statement Date:
- Date Updated: 22 Apr 2003
PuTTY cannot be vulnerable to any attack of this type in the SSH1 transport layer, since it is an SSH client only and the RSA decryption is done in the server. An SSH agent could feasibly be vulnerable if it reported SSH_AGENT_FAILURE in response to PKCS encoding errors, but PuTTY's agent implementation (Pageant) will never do this, so it is believed safe.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.