Openssh 7.9 P1

Posted on  by 



  1. Openssh 7.9 P1 Portable

Executive Summary

Informations
NameCVE-2019-6110First vendor Publication2019-01-31
VendorCveLast vendor Modification2020-08-24

But the scan report includes a line 'customers are advised to upgrade to OpenSSH 8.4/8.4 P1. I'm on version 7.4 P1. If I executed yum update openssh it returns 'nothing to do'. An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshdconfig file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Overall CVSS Score6.8
Base Score6.8Environmental Score6.8
impact SubScore5.2Temporal Score6.8
Exploitabality Sub Score1.6
Attack VectorNetworkAttack ComplexityHigh
Privileges RequiredNoneUser InteractionRequired
ScopeUnchangedConfidentiality ImpactHigh
Integrity ImpactHighAvailability ImpactNone
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N)
Cvss Base Score4Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityHigh
Cvss Expoit Score4.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6110

Sources (Detail)

SourceUrl
CONFIRMhttps://security.netapp.com/advisory/ntap-20190213-0001/
EXPLOIT-DBhttps://www.exploit-db.com/exploits/46193/
GENTOOhttps://security.gentoo.org/glsa/201903-16
MISChttps://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

Alert History

If you want to see full details history, please login or register.
DateInformations
2021-04-22 02:49:28
  • Multiple Updates
2021-02-05 01:28:47
  • Multiple Updates
2020-09-03 01:27:47
  • Multiple Updates
2020-07-25 12:24:48
  • Multiple Updates
2020-05-23 02:32:08
  • Multiple Updates
2019-10-05 12:11:36
  • Multiple Updates
2019-04-18 21:19:12
  • Multiple Updates
2019-04-17 12:08:37
  • Multiple Updates
2019-03-21 21:19:23
  • Multiple Updates
2019-03-07 21:19:28
  • Multiple Updates
2019-02-27 17:19:15
  • Multiple Updates
2019-02-15 12:08:42
  • Multiple Updates
2019-02-05 21:19:39
  • Multiple Updates
2019-02-01 17:18:59
  • Multiple Updates
2019-01-31 21:19:38
  • First insertion

Executive Summary

Openssh 7.9 P1
Informations
NameCVE-2019-6110First vendor Publication2019-01-31
VendorCveLast vendor Modification2020-08-24

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Overall CVSS Score6.8
Base Score6.8Environmental Score6.8
impact SubScore5.2Temporal Score6.8
Exploitabality Sub Score1.6
Attack VectorNetworkAttack ComplexityHigh
Privileges RequiredNoneUser InteractionRequired
ScopeUnchangedConfidentiality ImpactHigh
Integrity ImpactHighAvailability ImpactNone
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N)
Cvss Base Score4Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityHigh
Cvss Expoit Score4.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6110

Sources (Detail)

SourceUrl
CONFIRMhttps://security.netapp.com/advisory/ntap-20190213-0001/
EXPLOIT-DBhttps://www.exploit-db.com/exploits/46193/
GENTOOhttps://security.gentoo.org/glsa/201903-16
MISChttps://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

Alert History

Openssh 7.9 P1
If you want to see full details history, please login or register.

Openssh 7.9 P1 Portable

DateInformations
2021-04-22 02:49:28
  • Multiple Updates
2021-02-05 01:28:47
  • Multiple Updates
2020-09-03 01:27:47
  • Multiple Updates
2020-07-25 12:24:48
  • Multiple Updates
2020-05-23 02:32:08
  • Multiple Updates
2019-10-05 12:11:36
  • Multiple Updates
2019-04-18 21:19:12
  • Multiple Updates
2019-04-17 12:08:37
  • Multiple Updates
2019-03-21 21:19:23
  • Multiple Updates
2019-03-07 21:19:28
  • Multiple Updates
2019-02-27 17:19:15
  • Multiple Updates
2019-02-15 12:08:42
  • Multiple Updates
2019-02-05 21:19:39
  • Multiple Updates
2019-02-01 17:18:59
  • Multiple Updates
2019-01-31 21:19:38
  • First insertion




Coments are closed