Security fix: sensitive data no longer retained in memory

Dec 12, 2011 11:31 GMT  ·  By

The latest beta release for PuTTY brings to the table a very important security fix. The flaw would allow passwords to be retained in the memory, leaving it susceptible to malware with access to PuTTY process or the memory.

Version 0.62 of the SSH and Telnet client does away with this issue and wipes the data it no longer needs out of its memory. The vulnerability perpetuated through versions 0.59, 0.60 and 0.61 of the application.

Putty is not a tool for the regular user, as it is mostly used by system administrators or network engineers that need to connect to remote systems. It is an open source solution, extremely reliable for IT professionals that want to transfer files securely.

Download PuTTY for Windows from this page; portable edition here Download PuTTY for Linux from this page