Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15906

Опубликовано: 26 окт. 2017
Источник: debian
EPSS Низкий

Описание

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:7.6p1-1package
opensshfixed1:7.4p1-10+deb9u3stretchpackage
opensshno-dsawheezypackage

Примечания

  • https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19

EPSS

Процентиль: 86%
0.02761
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 8 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVSS3: 4.3
redhat
около 8 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVSS3: 5.3
nvd
около 8 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVSS3: 5.3
github
больше 3 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

oracle-oval
больше 7 лет назад

ELSA-2018-0980: openssh security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 86%
0.02761
Низкий