First published: Tue Jan 15 2019(Updated: )
OpenSSH has a vulnerability in the scp client utility. Due to missing character encoding in the progress display, the object name can be used to manipulate the client output, for example to employ ANSI codes to hide additional files being transferred. External Reference: <a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt">https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt</a> Proposed Patch: <a href="https://sintonen.fi/advisories/scp-name-validator.patch">https://sintonen.fi/advisories/scp-name-validator.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1666119 is considered medium due to potential manipulation of the scp client output.
To fix REDHAT-BUG-1666119, update to the latest version of OpenSSH that addresses this vulnerability.
The affected product in REDHAT-BUG-1666119 is the OpenSSH scp client utility.
Yes, REDHAT-BUG-1666119 can be exploited remotely if an attacker controls the file names used in the scp command.
Mitigation for REDHAT-BUG-1666119 includes updating the software and applying best practices for file name validation.