5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
openssh is vulnerable to arbitrary file overwrite. Improper validation of object names allows a malicious server to overwrite files on the client-side via scp client.
CPE | Name | Operator | Version |
---|---|---|---|
openssh | eq | 7.8p1__4.el8 | |
openssh | eq | 7.8p1__4.el8 |
lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
www.openwall.com/lists/oss-security/2019/04/18/1
www.openwall.com/lists/oss-security/2022/08/02/1
www.securityfocus.com/bid/106741
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
access.redhat.com/errata/RHSA-2019:3702
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1667519
bugzilla.redhat.com/show_bug.cgi?id=1668325
bugzilla.redhat.com/show_bug.cgi?id=1677794
bugzilla.redhat.com/show_bug.cgi?id=1683295
bugzilla.redhat.com/show_bug.cgi?id=1685096
bugzilla.redhat.com/show_bug.cgi?id=1686065
bugzilla.redhat.com/show_bug.cgi?id=1691045
bugzilla.redhat.com/show_bug.cgi?id=1707485
bugzilla.redhat.com/show_bug.cgi?id=1712436
bugzilla.redhat.com/show_bug.cgi?id=1732424
bugzilla.redhat.com/show_bug.cgi?id=1732449
cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
lists.debian.org/debian-lts-announce/2019/03/msg00030.html
lists.fedoraproject.org/archives/list/[email protected]/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
security.gentoo.org/glsa/201903-16
security.netapp.com/advisory/ntap-20190213-0001/
sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
usn.ubuntu.com/3885-1/
usn.ubuntu.com/3885-2/
www.debian.org/security/2019/dsa-4387
www.exploit-db.com/exploits/46193/
www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P