PuTTY 0.74

PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator.

Tags win32 putty ssh telnet terminal-client file-transfer ftp tftp
License MITL
State beta

Recent Releases

0.7429 Jun 2020 00:45 minor feature: Security : if an SSH server accepted an offer of a public key And then rejected the signature, PuTTY could access freed memory, if The key had come from an SSH agent.. Security feature: new config option to disable PuTTY's dynamic Host key preference policy, if you prefer to avoid giving away to Eavesdroppers which hosts you have stored keys for.. : the installer UI was illegible in Windows high-contrast Mode.. : console password input failed on Windows 7.. in the terminal: one instance of the dreaded line==NULL" error box, and two other assertion failures.. : potential memory-consuming loop in -compatible padding. of an RSA signature from an agent.. : PSFTP's buffer handling worked badly with some servers particularly proftpd's. mod_sftp ).. : cursor could be wrongly positioned when restoring from. The alternate terminal screen. (A of this type was in 0.59; This is a case that that missed.). : character cell height could be a pixel too small when Running GTK PuTTY on Ubuntu 20.04 (or any other system with a Similarly up-to-date version of Pango).. : old-style (low resolution) scroll wheel events did not Work in GTK 3 PuTTY. This could stop the scroll wheel working at all in VNC.
0.7117 Mar 2019 11:05 minor feature: Security found by an EU-funded bounty programme: a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification potential recycling of random numbers used in cryptography. on Windows, hijacking by a malicious help file in the same directory as the executable. on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding. multiple denial-of-service attacks that can be triggered by writing to the terminal. Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels. We now provide pre-built binaries for Windows on Arm. Hardware-accelerated versions of the most common cryptographic primitives: AES, SHA-256, SHA-1. GTK PuTTY now supports non-X11 displays (e.g. Wayland) and high-DPI configurations. Type-ahead now works as soon as a PuTTY window is opened: keystrokes typed before authentication has finished will be buffered instead of being dropped. Support for GSSAPI key exchange: an alternative to the older GSSAPI authentication system which can keep your forwarded Kerberos credentials updated during a long session. More choices of user interface for clipboard handling. New terminal features: support the REP escape sequence, true colour, and SGR 2 dim text. Pressing Ctrl+Shift+PgUp or Ctrl+Shift+PgDn now takes you straight to the top or bottom of the terminal scrollback.
0.7011 Jul 2017 01:25 minor feature: Security : the Windows PuTTY binaries should no longer be Vulnerable to hijacking by specially named DLLs in the same directory, Even a name we missed when we thought we'd this in 0.69. See vuln-indirect-dll-hijack-3. Windows PuTTY should be able to print again, after our DLL. Hijacking defences broke that functionality. Windows PuTTY should be able to accept keyboard input outside the. Current code page, after our DLL hijacking defences broke that too.
0.6726 Mar 2016 21:15 minor feature: Security fix: a buffer overrun in the old-style SCP protocol when receiving the header of each file downloaded from the server is fixed. See vuln-pscp-sink-sscanf. Windows PuTTY now sets its process ACL more restrictively, in an attempt to defend against malicious other processes reading sensitive data out of its memory. Assorted other robustness fixes for crashes and memory leaks. We have started using Authenticode to sign our Windows executables and installer.