Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-14889
HistoryDec 10, 2019 - 12:00 a.m.

CVE-2019-14889

2019-12-1000:00:00
ubuntu.com
ubuntu.com
13

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.4%

A flaw was found with the libssh API function ssh_scp_new() in versions
before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a
server, the scp command, which includes a user-provided path, is executed
on the server-side. In case the library is used in a way where users can
influence the third parameter of the function, it would become possible for
an attacker to inject arbitrary commands, leading to a compromise of the
remote target.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlibssh< 0.8.0~20170825.94fa1e38-1ubuntu0.5UNKNOWN
ubuntu19.04noarchlibssh< 0.8.6-3ubuntu0.3UNKNOWN
ubuntu19.10noarchlibssh< 0.9.0-1ubuntu1.3UNKNOWN
ubuntu16.04noarchlibssh< 0.6.3-4.3ubuntu0.5UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.4%