漏洞信息详情
OpenSSH 访问控制错误漏洞
漏洞简介
OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组所维护的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。scp Client是其中的一个SCP客户端。
OpenSSH 7.9版本中的scp客户端的scp.c文件存在安全漏洞。远程攻击者可借助.文件名或空文件名利用该漏洞造成SSH服务器绕过访问限制。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
参考网址
来源:MISC
链接:https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
来源:MISC
链接:https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
来源:MISC
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-20685
来源:GENTOO
链接:https://security.gentoo.org/glsa/201903-16
来源:BID
链接:https://www.securityfocus.com/bid/106531
来源:GENTOO
链接:https://security.gentoo.org/glsa/202007-53
来源:BID
链接:http://www.securityfocus.com/bid/106531
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3702
来源:MISC
链接:https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
来源:UBUNTU
链接:https://usn.ubuntu.com/3885-1/
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190215-0001/
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4387
来源:support.f5.com
链接:https://support.f5.com/csp/article/K11315080
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20685
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1665785
来源:www.openssh.org
链接:http://www.openssh.org/
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3702
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4387
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10872060
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152154/Gentoo-Linux-Security-Advisory-201903-16.html
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10872060
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/75338
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/106531
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1280.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1280/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3795/
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/106531
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2671/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158639/Gentoo-Linux-Security-Advisory-202007-53.html
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10882554
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1410/
受影响实体
暂无
补丁
- OpenSSH scp客户端安全漏洞的修复措施<!--2019-1-11-->
还没有评论,来说两句吧...