Количество 22
Количество 22

CVE-2019-6111
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVE-2019-6111
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVE-2019-6111
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6111
An issue was discovered in OpenSSH 7.9. Due to the scp implementation ...
GHSA-jr78-hfw4-xp7g
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

BDU:2019-03788
Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу

BDU:2019-00830
Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю манипулировать файлами в каталоге клиента

openSUSE-SU-2019:1602-1
Security update for openssh

openSUSE-SU-2019:0307-1
Security update for openssh

SUSE-SU-2019:1524-1
Security update for openssh

SUSE-SU-2019:14030-1
Security update for openssh

SUSE-SU-2019:14016-1
Security update for openssh

SUSE-SU-2019:0941-1
Security update for openssh

SUSE-SU-2019:0496-1
Security update for openssh
ELSA-2019-3702
ELSA-2019-3702: openssh security, bug fix, and enhancement update (MODERATE)

openSUSE-SU-2019:0093-1
Security update for openssh

openSUSE-SU-2019:0091-1
Security update for openssh

SUSE-SU-2019:13931-1
Security update for openssh

SUSE-SU-2019:0132-1
Security update for openssh

SUSE-SU-2019:0126-1
Security update for openssh
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-6111 An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). | CVSS3: 5.9 | 66% Средний | больше 6 лет назад |
![]() | CVE-2019-6111 An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). | CVSS3: 5.3 | 66% Средний | почти 7 лет назад |
![]() | CVE-2019-6111 An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). | CVSS3: 5.9 | 66% Средний | больше 6 лет назад |
CVE-2019-6111 An issue was discovered in OpenSSH 7.9. Due to the scp implementation ... | CVSS3: 5.9 | 66% Средний | больше 6 лет назад | |
GHSA-jr78-hfw4-xp7g An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). | CVSS3: 5.9 | 66% Средний | больше 3 лет назад | |
![]() | BDU:2019-03788 Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу | CVSS3: 5.9 | 66% Средний | больше 6 лет назад |
![]() | BDU:2019-00830 Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю манипулировать файлами в каталоге клиента | CVSS3: 5.9 | 66% Средний | больше 6 лет назад |
![]() | openSUSE-SU-2019:1602-1 Security update for openssh | около 6 лет назад | ||
![]() | openSUSE-SU-2019:0307-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:1524-1 Security update for openssh | около 6 лет назад | ||
![]() | SUSE-SU-2019:14030-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:14016-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0941-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0496-1 Security update for openssh | больше 6 лет назад | ||
ELSA-2019-3702 ELSA-2019-3702: openssh security, bug fix, and enhancement update (MODERATE) | почти 6 лет назад | |||
![]() | openSUSE-SU-2019:0093-1 Security update for openssh | больше 6 лет назад | ||
![]() | openSUSE-SU-2019:0091-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:13931-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0132-1 Security update for openssh | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0126-1 Security update for openssh | больше 6 лет назад |
Уязвимостей на страницу