CVE编号
CVE-2019-6111利用情况
暂无补丁情况
官方补丁披露时间
2019-02-01漏洞描述
在OpenSSH 7.9中发现了一个问题。由于scp实现是从1983 rcp派生的,因此服务器选择将哪些文件/目录发送到客户端。但是,scp客户端仅对返回的对象名称执行粗略的验证(仅防止目录遍历攻击)。恶意的scp服务器(或中间人攻击者)可以覆盖scp客户端目标目录中的任意文件。如果执行了递归操作(-r),则服务器也可以操纵子目录(例如,覆盖.ssh / authorized_keys文件)。解决建议
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:https://www.openssh.com/
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html | |
http://www.openwall.com/lists/oss-security/2019/04/18/1 | |
http://www.securityfocus.com/bid/106741 | |
https://access.redhat.com/errata/RHSA-2019:3702 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1677794 | |
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c | |
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c442298418... | |
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc... | |
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec7... | |
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def... | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://security.gentoo.org/glsa/201903-16 | |
https://security.netapp.com/advisory/ntap-20190213-0001/ | |
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt | |
https://usn.ubuntu.com/3885-1/ | |
https://usn.ubuntu.com/3885-2/ | |
https://www.debian.org/security/2019/dsa-4387 | |
https://www.exploit-db.com/exploits/46193/ | |
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc | |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openbsd | openssh | * |
Up to (including) 7.9 |
|||||
运行在以下环境 | |||||||||
应用 | winscp | winscp | * |
Up to (including) 5.1.3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.6 | openssh | * |
Up to (excluding) 7.5_p1-r4 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | openssh | * |
Up to (excluding) 7.5_p1-r10 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | openssh | * |
Up to (excluding) 7.7_p1-r4 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | openssh | * |
Up to (excluding) 7.9_p1-r3 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | openssh | * |
Up to (excluding) 7.4p1-16.amzn2.0.6 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | openssh | * |
Up to (excluding) 7.4p1-21.73.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | openssh | * |
Up to (excluding) 8.0p1-3.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | openssh | * |
Up to (excluding) 1:6.7p1-5+deb8u6 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | openssh | * |
Up to (excluding) 1:7.4p1-10+deb9u6 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | openssh | * |
Up to (excluding) 8.0p1-1.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | openssh | * |
Up to (excluding) 7.6p1-lp150.8.15.2 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | openssh | * |
Up to (excluding) 7.2p2-35.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | openssh | * |
Up to (excluding) 8.0p1-3.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | openssh | * |
Up to (excluding) 8.0p1-3.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | openssh | * |
Up to (excluding) 36.12.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | openssh | * |
Up to (excluding) 74.35.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | openssh | * |
Up to (excluding) 74.35.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | openssh | * |
Up to (excluding) 1:6.6p1-2ubuntu2.13 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | openssh | * |
Up to (excluding) 1:7.2p2-4ubuntu2.8 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | openssh | * |
Up to (excluding) 1:7.6p1-4ubuntu0.3 |
|||||
- 攻击路径 远程
- 攻击复杂度 困难
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...