First published: Wed Oct 25 2017(Updated: )
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssh | <7.6 | 7.6 |
ubuntu/openssh | <1:7.5 | 1:7.5 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:6.6 | 1:6.6 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:7.2 | 1:7.2 |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.2p1-2+deb12u3 1:9.8p1-2 | |
OpenSSH | <7.6 | |
Oracle Sun ZFS Storage Appliance Kit software | =8.8.6 | |
Debian | =8.0 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp cloud backup | ||
IBM Data ONTAP | ||
NetApp Data ONTAP Edge | ||
netapp hci management node | ||
NetApp OnCommand Unified Manager for Windows | ||
netapp solidfire | ||
NetApp SteelStore | ||
NetApp Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere | >=9.7 | |
NetApp Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere | =9.6 | |
NetApp VASA Provider | >=6.0<=6.2 | |
NetApp VASA Provider | >=9.7 | |
NetApp Virtual Storage Console for VMware vSphere | >=9.7 | |
NetApp Virtual Storage Console for VMware vSphere | =9.6 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
NetApp CN1610 | ||
NetApp CN1610 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15906 has a medium severity rating, as it allows attackers to create zero-length files in readonly mode.
To fix CVE-2017-15906, upgrade OpenSSH to version 7.6 or later.
OpenSSH versions before 7.6 are affected by CVE-2017-15906.
Yes, CVE-2017-15906 can impact file integrity by allowing creation of zero-length files in readonly mode.
Mitigation of CVE-2017-15906 involves ensuring your OpenSSH installation is updated to version 7.6 or later.