PuTTY 0.70 is released

Simon Tatham anakin at pobox.com
Sat Jul 8 08:10:39 BST 2017

PuTTY version 0.70 is released

All the pre-built binaries, and the source code, are now available
from the PuTTY website at


There is one SECURITY FIX in this release:

 - Fixed yet another instance of Windows DLL hijacking. 0.68 and 0.69
   fixed many of these, but could still be hijacked by a DLL in the
   same directory as its executable file with the name CRYPTBASE.DLL.
   0.70 should now be safe against this attack, as well as the ones
   0.69 prevented.

The remaining changes in 0.70 are bug fixes and minor updates:

 - Fixed a crash introduced in 0.69 when using the Windows printing

 - Fixed Windows keyboard input of Unicode characters outside the
   system code page, which 0.69 also broke.

 - Updated the terminal's understanding of Unicode character widths in
   line with Unicode 9.0.0.

Administrative note: the main PuTTY website has now switched over to
being accessed by HTTPS. The old HTTP location will still work, and
will redirect immediately to the HTTPS version, but to avoid even a
momentary window of vulnerability to network attacks, we suggest
updating any bookmarks and links you might have to the new HTTPS
location (as shown above).

Enjoy using PuTTY!

for k in [pow(x,37,0x1a1298d262b49c895d47f) for x in [0x50deb914257022de7fff,
0x213558f2215127d5a2d1, 0x90c99e86d08b91218630, 0x109f3d0cfbf640c0beee7,
0xc83e01379a5fbec5fdd1, 0x19d3d70a8d567e388600e, 0x534e2f6e8a4a33155123]]:
 print "".join([chr(32+3*((k>>x)&1))for x in range(79)]) # <anakin at pobox.com>

More information about the PuTTY-announce mailing list