Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-15906

Опубликовано: 03 окт. 2017
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensshNot affected
Red Hat Enterprise Linux 6opensshNot affected
Red Hat Enterprise Linux 7opensshFixedRHSA-2018:098010.04.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1506630openssh: Improper write operations in readonly mode allow for zero-length file creation

EPSS

Процентиль: 86%
0.02761
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 8 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVSS3: 5.3
nvd
около 8 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVSS3: 5.3
debian
около 8 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does ...

CVSS3: 5.3
github
больше 3 лет назад

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

oracle-oval
больше 7 лет назад

ELSA-2018-0980: openssh security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 86%
0.02761
Низкий

4.3 Medium

CVSS3