First published: Thu Jan 31 2019(Updated: )
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | <=1:7.9p1-10+deb10u2<=1:7.9p1-10+deb10u4<=1:8.4p1-5+deb11u2<=1:8.4p1-5+deb11u3<=1:9.2p1-2+deb12u1<=1:9.2p1-2+deb12u2<=1:9.6p1-2 | |
Openbsd Openssh | <=7.9 | |
Winscp Winscp | <=5.13 | |
Netapp Element Software | ||
Netapp Ontap Select Deploy | ||
Netapp Storage Automation Store | ||
Siemens Scalance X204rna Firmware | <3.2.7 | |
Siemens Scalance X204rna | ||
Siemens Scalance X204rna Eec Firmware | <3.2.7 | |
Siemens Scalance X204rna Eec |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this OpenSSH vulnerability is CVE-2019-6110.
CVE-2019-6110 has a severity rating of 6.8 (medium).
The affected software versions include OpenSSH 7.9, WinSCP 5.13, Netapp Element Software, Netapp Ontap Select Deploy, and Netapp Storage Automation Store.
A malicious server can exploit CVE-2019-6110 by manipulating the client output using arbitrary stderr output, for example, by using ANSI control codes to hide additional files being transferred.
You can find more information about CVE-2019-6110 at the following references: [Reference 1](https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf), [Reference 2](https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c), [Reference 3](https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c).