In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
The product uses or specifies an encoding when generating output to a downstream component, but the specified encoding is not the same as the encoding that is expected by the downstream component.
Link | Tags |
---|---|
https://security.netapp.com/advisory/ntap-20190213-0001/ | third party advisory |
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c | release notes |
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c | release notes |
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt | third party advisory |
https://www.exploit-db.com/exploits/46193/ | third party advisory vdb entry exploit |
https://security.gentoo.org/glsa/201903-16 | third party advisory vendor advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | third party advisory patch |