Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-6110

Опубликовано: 16 нояб. 2018
Источник: redhat
CVSS3: 6.8
EPSS Средний

Описание

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

Отчет

This vulnerability is rated as a moderate because it allows a malicious server or a Man-in-the-Middle attacker to manipulate client output by injecting arbitrary stderr content, on exploitation this could mislead the user into thinking the operation was successful or reporting false information, it can facilitate social engineering attacks. This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected. For more detailed analysis please refer to: https://bugzilla.redhat.com/show_bug.cgi?id=1666124#c2

Меры по смягчению последствий

This issue only affects the users of scp binary which is a part of openssh-clients package. Other usage of SSH protocol or other ssh clients is not affected. Administrators can uninstall openssh-clients for additional protection against accidental usage of this binary. Removing the openssh-clients package will make binaries like scp and ssh etc unavailable on that system. Note: To exploit this flaw, the victim needs to connect to a malicious SSH server or MITM (Man-in-the-middle) the scp connection, both of which can be detected by the system administrator via a change in the host key of the SSH server. Further, if connections via scp are made to only trusted SSH servers, then those use-cases are not vulnerable to this security flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensshOut of support scope
Red Hat Enterprise Linux 6opensshOut of support scope
Red Hat Enterprise Linux 7opensshWill not fix
Red Hat Enterprise Linux 8opensshWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-451
https://bugzilla.redhat.com/show_bug.cgi?id=1666124openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output

EPSS

Процентиль: 98%
0.51287
Средний

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
около 7 лет назад

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

CVSS3: 6.8
nvd
около 7 лет назад

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

CVSS3: 6.8
debian
около 7 лет назад

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr outpu ...

CVSS3: 6.8
github
больше 3 лет назад

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

CVSS3: 6.8
fstec
около 7 лет назад

Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла

EPSS

Процентиль: 98%
0.51287
Средний

6.8 Medium

CVSS3