PuTTY 0.70 is released
anakin at pobox.com
Sat Jul 8 08:10:39 BST 2017
PuTTY version 0.70 is released
All the pre-built binaries, and the source code, are now available
from the PuTTY website at
There is one SECURITY FIX in this release:
- Fixed yet another instance of Windows DLL hijacking. 0.68 and 0.69
fixed many of these, but could still be hijacked by a DLL in the
same directory as its executable file with the name CRYPTBASE.DLL.
0.70 should now be safe against this attack, as well as the ones
The remaining changes in 0.70 are bug fixes and minor updates:
- Fixed a crash introduced in 0.69 when using the Windows printing
- Fixed Windows keyboard input of Unicode characters outside the
system code page, which 0.69 also broke.
- Updated the terminal's understanding of Unicode character widths in
line with Unicode 9.0.0.
Administrative note: the main PuTTY website has now switched over to
being accessed by HTTPS. The old HTTP location will still work, and
will redirect immediately to the HTTPS version, but to avoid even a
momentary window of vulnerability to network attacks, we suggest
updating any bookmarks and links you might have to the new HTTPS
location (as shown above).
Enjoy using PuTTY!
for k in [pow(x,37,0x1a1298d262b49c895d47f) for x in [0x50deb914257022de7fff,
0x213558f2215127d5a2d1, 0x90c99e86d08b91218630, 0x109f3d0cfbf640c0beee7,
0xc83e01379a5fbec5fdd1, 0x19d3d70a8d567e388600e, 0x534e2f6e8a4a33155123]]:
print "".join([chr(32+3*((k>>x)&1))for x in range(79)]) # <anakin at pobox.com>
More information about the PuTTY-announce