#VU6127 Directory traversal in OpenSSH
Published: March 20, 2017
OpenSSH
OpenSSH
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists in sftp-client in portable version of OpenSSH when processing file names. A remote attacker can trick the victim to connect to a malicious SFTP server and perform operations on files with specially crafted file names, containing directory traversal sequences (e.g. ../../).
Successful exploitation of the vulnerability may allow an attacker to overwrite arbitrary files on the victim’s system.