CVE-2019-6111
31.01.2019, 18:29
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
Vendor | Product | Version |
---|---|---|
openbsd | openssh | 𝑥 ≤ 7.9 |
winscp | winscp | 𝑥 ≤ 5.1.3 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 18.10 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux_eus | 8.1 |
redhat | enterprise_linux_eus | 8.2 |
redhat | enterprise_linux_eus | 8.4 |
redhat | enterprise_linux_eus | 8.6 |
redhat | enterprise_linux_server_aus | 8.2 |
redhat | enterprise_linux_server_aus | 8.4 |
redhat | enterprise_linux_server_aus | 8.6 |
redhat | enterprise_linux_server_tus | 8.2 |
redhat | enterprise_linux_server_tus | 8.4 |
redhat | enterprise_linux_server_tus | 8.6 |
apache | mina_sshd | 2.2.0 |
freebsd | freebsd | 𝑥 < 12.0 |
freebsd | freebsd | 12.0 |
freebsd | freebsd | 12.0:p1 |
freebsd | freebsd | 12.0:p2 |
freebsd | freebsd | 12.0:p3 |
siemens | scalance_x204rna_firmware | 𝑥 < 3.2.7 |
siemens | scalance_x204rna_eec_firmware | 𝑥 < 3.2.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssh |
| ||||||||||||||||||||||||||||||
openssh-ssh1 |
|
References