First published: Tue Jan 15 2019(Updated: )
OpenSSH has a vulnerability in the scp client utility. Due to missing character encoding in the progress display, the object name can be used to manipulate the client output, for example to employ ANSI codes to hide additional files being transferred. External Reference: <a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt">https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt</a> Proposed Patch: <a href="https://sintonen.fi/advisories/scp-name-validator.patch">https://sintonen.fi/advisories/scp-name-validator.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GSI OpenSSH |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.