First published: Thu Feb 07 2019(Updated: )
Harry Sintonen discovered multiple issues in the OpenSSH scp utility. If a user or automated system were tricked into connecting to an untrusted server, a remote attacker could possibly use these issues to write to arbitrary files, change directory permissions, and spoof client output.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openssh-client | <1:7.7p1-4ubuntu0.2 | 1:7.7p1-4ubuntu0.2 |
Ubuntu Ubuntu | =18.10 | |
All of | ||
ubuntu/openssh-client | <1:7.6p1-4ubuntu0.2 | 1:7.6p1-4ubuntu0.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/openssh-client | <1:7.2p2-4ubuntu2.7 | 1:7.2p2-4ubuntu2.7 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/openssh-client | <1:6.6p1-2ubuntu2.12 | 1:6.6p1-2ubuntu2.12 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID is USN-3885-1.
The vulnerability title is OpenSSH vulnerabilities.
Multiple issues were discovered in the OpenSSH scp utility.
If a user or automated system connects to an untrusted server, a remote attacker could write to arbitrary files, change directory permissions, and spoof client output.
OpenSSH client versions 7.7p1-4ubuntu0.2, 7.6p1-4ubuntu0.2, 7.2p2-4ubuntu2.7, and 6.6p1-2ubuntu2.12 on Ubuntu 18.10, 18.04, 16.04, and 14.04, respectively.
Update your OpenSSH client to version 1:7.7p1-4ubuntu0.2 on Ubuntu 18.10, 1:7.6p1-4ubuntu0.2 on Ubuntu 18.04, 1:7.2p2-4ubuntu2.7 on Ubuntu 16.04, and 1:6.6p1-2ubuntu2.12 on Ubuntu 14.04.
More information about this vulnerability can be found at the following references: 1. [CVE-2018-20685](https://ubuntu.com/security/CVE-2018-20685) 2. [CVE-2019-6109](https://ubuntu.com/security/CVE-2019-6109) 3. [CVE-2019-6111](https://ubuntu.com/security/CVE-2019-6111)