First published: Tue Dec 10 2019(Updated: )
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libssh | 0.9.8-0+deb11u1 0.10.6-0+deb12u1 0.11.1-1 | |
Ubuntu | <0.8.8 | |
Ubuntu | >=0.9.0<0.9.3 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Ubuntu Linux | =19.10 | |
openSUSE | =15.1 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian GNU/Linux | =8.0 | |
oracle mysql workbench | <=8.0.19 | |
libssh | <0.8.8 | |
libssh | >=0.9.0<0.9.3 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
Ubuntu | =19.10 | |
SUSE Linux | =15.1 | |
Fedora | =30 | |
Fedora | =31 | |
Debian | =8.0 | |
Oracle MySQL Workbench CE | <=8.0.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14889 is a vulnerability found in the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, a user-provided path can execute a command on the server-side.
The severity of CVE-2019-14889 is critical with a CVSS score of 8.8.
Versions before 0.9.3 and before 0.8.8 of libssh are affected. Additionally, Canonical Ubuntu Linux 16.04, 18.04, 19.04, 19.10, openSUSE Leap 15.1, Fedoraproject Fedora 30, 31, and Debian Debian Linux 8.0 are affected as well.
To fix CVE-2019-14889, users should update to version 0.9.3 or later of libssh.
You can find more information about CVE-2019-14889 at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html), [2](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html), [3](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889)