Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-12062

Опубликовано: 01 июн. 2020
Источник: ubuntu
Приоритет: negligible
CVSS2: 5
CVSS3: 7.5

Описание

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.

РелизСтатусПримечание
bionic

ignored

devel

not-affected

1:8.3p1-1
eoan

ignored

esm-infra-legacy/trusty

ignored

esm-infra/bionic

ignored

esm-infra/focal

ignored

esm-infra/xenial

ignored

focal

ignored

precise/esm

ignored

trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

ignored

devel

ignored

eoan

ignored

esm-apps/bionic

ignored

esm-apps/focal

ignored

esm-infra-legacy/trusty

DNE

focal

ignored

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
больше 5 лет назад

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.

CVSS3: 7.5
nvd
больше 5 лет назад

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.

CVSS3: 7.5
debian
больше 5 лет назад

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to ...

CVSS3: 7.5
github
больше 3 лет назад

** DISPUTED ** The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances."

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость клиента scp средства криптографической защиты OpenSSH, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю перезаписывать произвольные файлы в каталоге загрузки клиента

5 Medium

CVSS2

7.5 High

CVSS3