First published: Tue Jan 15 2019(Updated: )
OpenSSH has a vulnerability in the scp client utility. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, scp client only perform cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example overwrite .ssh/authorized_keys). External Reference: <a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt">https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt</a> Proposed Patch: <a href="https://sintonen.fi/advisories/scp-name-validator.patch">https://sintonen.fi/advisories/scp-name-validator.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GSI OpenSSH |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.