Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:0125-2

Опубликовано: 29 апр. 2019
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

Security issue fixed:

  • CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
  • CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
  • CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
  • CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)

Список пакетов

SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-6.6p1-54.26.1
openssh-askpass-gnome-6.6p1-54.26.1
openssh-fips-6.6p1-54.26.1
openssh-helpers-6.6p1-54.26.1

Описание

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.


Затронутые продукты
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1

Ссылки

Описание

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.


Затронутые продукты
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1

Ссылки

Описание

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.


Затронутые продукты
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1

Ссылки

Описание

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).


Затронутые продукты
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.26.1

Ссылки