SB2019062408 - OpenSUSE Linux update for openssh



SB2019062408 - OpenSUSE Linux update for openssh

Published: June 24, 2019 Updated: June 27, 2019

Security Bulletin ID SB2019062408
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Spoofing attack (CVE-ID: CVE-2019-6109)

The vulnerability allows a remote attacker to conduct spoofing attack on the target system.

The weakness exists due to accepting and displaying arbitrary stderr output from the scp server by the scp client. A malicious SCP server can use the object name to manipulate the client output, for example to employ ANSI codes to hide additional files being transferred.

2) Security restrictions bypass (CVE-ID: CVE-2019-6111)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to missing received object name validation by the scp client. A malicious SCP server can overwrite arbitrary files in the SCP client target directory. If a recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example overwrite .ssh/authorized_keys).



Remediation

Install update from vendor's website.