First published: Mon Jan 14 2019(Updated: )
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. Upstream Patch: <a href="https://github.com/openssh/openssh-portable/commit/6010c030">https://github.com/openssh/openssh-portable/commit/6010c030</a> <a href="https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h">https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1665785 is classified as high due to the potential for unauthorized access to files.
To fix REDHAT-BUG-1665785, update your OpenSSH installation to the latest version that includes the patch.
REDHAT-BUG-1665785 affects OpenSSH version 7.9 and possibly earlier versions.
The vulnerability in REDHAT-BUG-1665785 allows unauthorized file access through manipulated filenames.
A workaround for REDHAT-BUG-1665785 may include restricting file access permissions until an update is applied.