Lucene search

K
f5F5F5:K21350967
HistoryJan 17, 2019 - 12:00 a.m.

K21350967 : OpenSSH vulnerability CVE-2019-6111

2019-01-1700:00:00
my.f5.com
1111

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.2%

Security Advisory Description

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). (CVE-2019-6111)

Impact

Improper validation of object names allows a malicious server to overwrite files through the OpenSSH SCP client.