Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-6110
HistoryJan 31, 2019 - 12:00 a.m.

CVE-2019-6110

2019-01-3100:00:00
ubuntu.com
ubuntu.com
102

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

0.004 Low

EPSS

Percentile

74.4%

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output
from the server, a malicious server (or Man-in-The-Middle attacker) can
manipulate the client output, for example to use ANSI control codes to hide
additional files being transferred.

Notes

Author Note
seth-arnold openssh-ssh1 is provided for compatibility with old devices that cannot be upgraded to modern protocols. Thus we may not provide security support for this package if doing so would prevent access to equipment.
mdeslaur The recommended workaround for this issue is to switch to using sftp instead of scp. Per https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037475.html upstream doesn’t consider this to be a vulnerability, and as of 2020-07-07, there is no upstream fix. We will not be fixing this issue in Ubuntu stable releases.

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

0.004 Low

EPSS

Percentile

74.4%