First published: Tue Jan 15 2019(Updated: )
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | <=7.9 | |
Winscp Winscp | <=5.1.3 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Fedoraproject Fedora | =30 | |
Apache MINA SSHD | =2.2.0 | |
FreeBSD FreeBSD | <12.0 | |
FreeBSD FreeBSD | =12.0 | |
FreeBSD FreeBSD | =12.0-p1 | |
FreeBSD FreeBSD | =12.0-p2 | |
FreeBSD FreeBSD | =12.0-p3 | |
Fujitsu M10-1 Firmware | <xcp2361 | |
Fujitsu M10-1 | ||
Fujitsu M10-4 Firmware | <xcp2361 | |
Fujitsu M10-4 | ||
Fujitsu M10-4s Firmware | <xcp2361 | |
Fujitsu M10-4s | ||
Fujitsu M12-1 Firmware | <xcp2361 | |
Fujitsu M12-1 | ||
Fujitsu M12-2 Firmware | <xcp2361 | |
Fujitsu M12-2 | ||
Fujitsu M12-2s Firmware | <xcp2361 | |
Fujitsu M12-2s | ||
Fujitsu M10-1 Firmware | <xcp3070 | |
Fujitsu M10-4 Firmware | <xcp3070 | |
Fujitsu M10-4s Firmware | <xcp3070 | |
Fujitsu M12-1 Firmware | <xcp3070 | |
Fujitsu M12-2 Firmware | <xcp3070 | |
Fujitsu M12-2s Firmware | <xcp3070 | |
Siemens Scalance X204rna Firmware | <3.2.7 | |
Siemens Scalance X204rna | ||
Siemens Scalance X204rna Eec Firmware | <3.2.7 | |
Siemens Scalance X204rna Eec | ||
All of | ||
Fujitsu M10-1 Firmware | <xcp2361 | |
Fujitsu M10-1 | ||
All of | ||
Fujitsu M10-4 Firmware | <xcp2361 | |
Fujitsu M10-4 | ||
All of | ||
Fujitsu M10-4s Firmware | <xcp2361 | |
Fujitsu M10-4s | ||
All of | ||
Fujitsu M12-1 Firmware | <xcp2361 | |
Fujitsu M12-1 | ||
All of | ||
Fujitsu M12-2 Firmware | <xcp2361 | |
Fujitsu M12-2 | ||
All of | ||
Fujitsu M12-2s Firmware | <xcp2361 | |
Fujitsu M12-2s | ||
All of | ||
Fujitsu M10-1 Firmware | <xcp3070 | |
Fujitsu M10-1 | ||
All of | ||
Fujitsu M10-4 Firmware | <xcp3070 | |
Fujitsu M10-4 | ||
All of | ||
Fujitsu M10-4s Firmware | <xcp3070 | |
Fujitsu M10-4s | ||
All of | ||
Fujitsu M12-1 Firmware | <xcp3070 | |
Fujitsu M12-1 | ||
All of | ||
Fujitsu M12-2 Firmware | <xcp3070 | |
Fujitsu M12-2 | ||
All of | ||
Fujitsu M12-2s Firmware | <xcp3070 | |
Fujitsu M12-2s | ||
All of | ||
Siemens Scalance X204rna Firmware | <3.2.7 | |
Siemens Scalance X204rna | ||
All of | ||
Siemens Scalance X204rna Eec Firmware | <3.2.7 | |
Siemens Scalance X204rna Eec | ||
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.9p1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6111 is a vulnerability in OpenSSH that allows directory traversal attacks during file transfers using scp.
CVE-2019-6111 has a severity score of 5.9, which is considered medium.
CVE-2019-6111 allows an attacker to potentially overwrite or retrieve arbitrary files on the server through scp file transfers.
OpenSSH versions 7.9 and prior are affected by CVE-2019-6111.
Yes, updating to OpenSSH version 7.9p1-10+deb10u2 or later will fix the vulnerability.