Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-6109

Опубликовано: 16 нояб. 2018
Источник: redhat
CVSS3: 3.1
EPSS Низкий

Описание

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

Отчет

This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected. For more detailed analysis please refer to: https://bugzilla.redhat.com/show_bug.cgi?id=1666119#c3

Меры по смягчению последствий

This issue only affects the users of scp binary which is a part of openssh-clients package. Other usage of SSH protocol or other ssh clients is not affected. Administrators can uninstall openssh-clients for additional protection against accidental usage of this binary. Removing the openssh-clients package will make binaries like scp and ssh etc unavailable on that system. Note: To exploit this flaw, the victim needs to connect to a malicious SSH server or MITM (Man-in-the-middle) the scp connection, both of which can be detected by the system administrator via a change in the host key of the SSH server. Further, if connections via scp are made to only trusted SSH servers, then those use-cases are not vulnerable to this security flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensshOut of support scope
Red Hat Enterprise Linux 6opensshOut of support scope
Red Hat Enterprise Linux 7opensshWill not fix
Red Hat Enterprise Linux 8opensshFixedRHSA-2019:370205.11.2019
Red Hat Enterprise Linux 8opensshFixedRHSA-2019:370205.11.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-451
https://bugzilla.redhat.com/show_bug.cgi?id=1666119openssh: Missing character encoding in progress display allows for spoofing of scp client output

EPSS

Процентиль: 92%
0.08073
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 6 лет назад

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

CVSS3: 6.8
nvd
больше 6 лет назад

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

CVSS3: 6.8
debian
больше 6 лет назад

An issue was discovered in OpenSSH 7.9. Due to missing character encod ...

CVSS3: 6.8
github
больше 3 лет назад

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

CVSS3: 6.8
fstec
больше 6 лет назад

Уязвимость функции refresh_progress_meter() (progressmeter.c) средства криптографической защиты OpenSSH, позволяющая нарушителю раскрыть защищаемую информацию или выполнить произвольный код

EPSS

Процентиль: 92%
0.08073
Низкий

3.1 Low

CVSS3