First published: Mon Jun 01 2020(Updated: )
** DISPUTED ** The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | =8.2 | |
=8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSH vulnerability is CVE-2020-12062.
The severity rating of CVE-2020-12062 is high with a score of 7.5.
The affected software is OpenSSH version 8.2.
A malicious unprivileged user on the remote server can exploit CVE-2020-12062 by creating a crafted subdirectory, leading to the overwriting of arbitrary files in the client's download directory.
Yes, OpenSSH has released patches for this vulnerability. Please refer to the OpenSSH website for more information.