SB2019121076 - OS Command Injection in libssh (Alpine package)
Published: December 10, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) OS Command Injection (CVE-ID: CVE-2019-14889)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to incorrect handling of the SCP command parameters when initiating the connection within the ssh_scp_new() function. A remote attacker can trick victim into using a specially crafted SCP command to connect to a remote SCP server and execute arbitrary commands on the target server with privileges of the current user.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=820819767d77749d1d95a6aad09459ea4b95805c
- https://git.alpinelinux.org/aports/commit/?id=aff6dec3dfa146ec68965e709c3e2dad1020c0a3
- https://git.alpinelinux.org/aports/commit/?id=981d44c46ea20fd4e9e399ee666437a7fdf2d574
- https://git.alpinelinux.org/aports/commit/?id=f853c4e3ca0c6161fd59ddb75b3f4e57c2d024f5
- https://git.alpinelinux.org/aports/commit/?id=4e617546654863ca795146a23e2e4c5037c7fa9f
- https://git.alpinelinux.org/aports/commit/?id=94410d4589eefca6191eb868fe534c981d9454c3