First published: Tue Dec 10 2019(Updated: )
It was discovered that libssh incorrectly handled certain scp commands. If a user or automated system were tricked into using a specially-crafted scp command, a remote attacker could execute arbitrary commands on the server.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssh-4 | <0.9.0-1ubuntu1.3 | 0.9.0-1ubuntu1.3 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/libssh-4 | <0.8.6-3ubuntu0.3 | 0.8.6-3ubuntu0.3 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/libssh-4 | <0.8.0~20170825.94fa1e38-1ubuntu0.5 | 0.8.0~20170825.94fa1e38-1ubuntu0.5 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libssh-4 | <0.6.3-4.3ubuntu0.5 | 0.6.3-4.3ubuntu0.5 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4219-1 is considered high due to the potential for arbitrary command execution by remote attackers.
To fix USN-4219-1, update libssh to the recommended versions provided in the security advisory.
The affected versions of Ubuntu include 16.04, 18.04, 19.04, and 19.10 with specific versions of libssh.
USN-4219-1 is associated with attacks that exploit improperly handled scp commands to execute arbitrary commands on the server.
No, USN-4219-1 is a vulnerability in the libssh library used by Ubuntu software.