PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20191127-0003/ |