First published: Wed Jan 25 2006(Updated: )
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.8 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =3.1 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =3.8.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.9 | |
OpenSSH | =3.0 | |
OpenSSH | =3.2 | |
OpenSSH | =3.6 | |
OpenSSH | =3.7 | |
OpenSSH | =4.0p1 | |
OpenSSH | =3.5p1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.9.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.0.1 | |
OpenSSH | =3.6.1 | |
OpenSSH | =4.1p1 | |
OpenSSH | =4.2p1 | |
OpenSSH | =3.7.1 | |
OpenSSH | =3.4 | |
OpenSSH | =3.5 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =3.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-0225 is rated as high due to its potential to allow remote command execution.
To fix CVE-2006-0225, it is recommended to upgrade to a patched version of OpenSSH, specifically versions later than 4.2p1.
CVE-2006-0225 affects OpenSSH versions 4.2p1 and earlier, including various older versions as specified in the vulnerability details.
The impact of CVE-2006-0225 is that an attacker can execute arbitrary commands on the target system through specially crafted filenames.
While CVE-2006-0225 has been identified as a serious vulnerability, its actual exploitation may vary and should be assessed based on system exposure.