Ergebnis 1 bis 6 von 6
-
29.07.2015, 12:07 #1
- Registriert seit
- 06.04.2013
- Beiträge
- 1.662
- Thanks (gegeben)
- 488
- Thanks (bekommen)
- 1126
- Total Downloaded
- 83,69 MB
- Total Downloaded
- 83,69 MB
Aktuelles PuTTY: A Free Telnet/SSH Client
Putty 0.65
2015-07-25 PuTTY 0.65 released, containing bug fixes
PuTTY 0.65, released today, fixes the Vista bug where the configuration dialog became invisible, and a few other bugs, large and small.
Download
-
Advertising
-
10.11.2015, 08:17 #2
- Registriert seit
- 06.04.2013
- Beiträge
- 1.662
- Thanks (gegeben)
- 488
- Thanks (bekommen)
- 1126
- Total Downloaded
- 83,69 MB
- Total Downloaded
- 83,69 MB
ThemenstarterPutty 0.66 (beta)
These features are new in beta 0.66 (released 2015-11-07):
- Security fix: an escape sequence which used to make PuTTY's terminal code read and potentially write the wrong memory is fixed. See vuln-ech-overflow.
- Bug fix: better Unicode handling in Windows PuTTY keyboard messages, so it should now work better with WinCompose.
- Bug fix: jump lists on Windows 10 should now work.
- There's now a set of command-line options to enable session logging.
- &P in the log file name now substitutes in the port number from the configuration.
-
Danke - 1 Thankslavemetoo bedankten sich
-
06.03.2016, 08:38 #3
- Registriert seit
- 06.04.2013
- Beiträge
- 1.662
- Thanks (gegeben)
- 488
- Thanks (bekommen)
- 1126
- Total Downloaded
- 83,69 MB
- Total Downloaded
- 83,69 MB
ThemenstarterPutty 0.67 (beta)
These features are new in beta 0.67 (released 2016-03-05):
Security fix: a buffer overrun in the old-style SCP protocol when receiving the header of each file downloaded from the server is fixed. See vuln-pscp-sink-sscanf.
Windows PuTTY now sets its process ACL more restrictively, in an attempt to defend against malicious other processes reading sensitive data out of its memory.
Assorted other robustness fixes for crashes and memory leaks.
We have started using Authenticode to sign our Windows executables and installer.
-
Danke - 1 Thankswilly01 bedankten sich
-
22.02.2017, 18:52 #4
- Registriert seit
- 06.04.2013
- Beiträge
- 1.662
- Thanks (gegeben)
- 488
- Thanks (bekommen)
- 1126
- Total Downloaded
- 83,69 MB
- Total Downloaded
- 83,69 MB
ThemenstarterPutty 0.68
0.68, released on 2017-02-21
MSI (‘Windows Installer’)
32-bit: putty-0.68-installer.msi (or by FTP) (signature)
64-bit: putty-64bit-0.68-installer.msi (or by FTP) (signature)
Unix source archive
.tar.gz: putty-0.68.tar.gz (or by FTP) (signature)
DOWNLOAD
-
29.04.2017, 17:45 #5
- Registriert seit
- 06.04.2013
- Beiträge
- 1.662
- Thanks (gegeben)
- 488
- Thanks (bekommen)
- 1126
- Total Downloaded
- 83,69 MB
- Total Downloaded
- 83,69 MB
ThemenstarterUpdate: Putty 0.69 released on 2017-04-29
These features are new in 0.69 (released 2017-04-29):
#Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even the names we missed when we thought we'd fixed this in 0.68. See vuln-indirect-dll-hijack-2.
#Windows PuTTY should work with MIT Kerberos again, after our DLL hijacking defences broke it. #Jump lists should now appear again on the PuTTY shortcut in the Windows Start Menu.
#You can now explicitly configure SSH terminal mode settings not to be sent to the server, if your server objects to them.Geändert von mr.strauss (29.04.2017 um 17:56 Uhr)
-
Danke - 4 Thanks
-
10.07.2017, 09:35 #6
- Registriert seit
- 06.04.2013
- Beiträge
- 1.662
- Thanks (gegeben)
- 488
- Thanks (bekommen)
- 1126
- Total Downloaded
- 83,69 MB
- Total Downloaded
- 83,69 MB
ThemenstarterUpdate
Putty 0.70, released on 2017-07-08
These features are new in 0.70 (released 2017-07-08):
- Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even a name we missed when we thought we'd fixed this in 0.69. See vuln-indirect-dll-hijack-3.
- Windows PuTTY should be able to print again, after our DLL hijacking defences broke that functionality.
- Windows PuTTY should be able to accept keyboard input outside the current code page, after our DLL hijacking defences broke that too.
Lesezeichen