First published: Tue Dec 19 2000(Updated: )
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH (Secure Shell) | =1.2.21 | |
SSH (Secure Shell) | =1.2.15 | |
SSH (Secure Shell) | =1.2.14 | |
SSH (Secure Shell) | =1.2.19 | |
SSH (Secure Shell) | =1.2.31 | |
SSH (Secure Shell) | =1.2.24 | |
SSH (Secure Shell) | =1.2.18 | |
OpenSSH | =1.2.3 | |
SSH (Secure Shell) | =1.2.20 | |
OpenSSH | =1.2 | |
SSH (Secure Shell) | =1.2.25 | |
SSH (Secure Shell) | =1.2.17 | |
SSH (Secure Shell) | =1.2.30 | |
SSH (Secure Shell) | =1.2.26 | |
SSH (Secure Shell) | =1.2.27 | |
SSH (Secure Shell) | =1.2.16 | |
SSH (Secure Shell) | =1.2.28 | |
SSH (Secure Shell) | =1.2.29 | |
SSH (Secure Shell) | =1.2.22 | |
SSH (Secure Shell) | =1.2.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0992 is considered a critical vulnerability due to its potential to allow arbitrary file overwriting.
To fix CVE-2000-0992, upgrade to a non-vulnerable version of SSH such as 1.2.32 or later.
CVE-2000-0992 affects SSH versions 1.2.14 to 1.2.31.
CVE-2000-0992 utilizes a directory traversal attack, often referred to as a dot dot attack.
Yes, CVE-2000-0992 can be exploited remotely by a malicious SCP server.