SB2020052708 - Security restrictions bypass in OpenSSH 



SB2020052708 - Security restrictions bypass in OpenSSH

Published: May 27, 2020

Security Bulletin ID SB2020052708
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Resource management error (CVE-ID: N/A)

The vulnerability allows a remote attacker to write arbitrary files to the victim's system.

The vulnerability exists due to improper management of scp(1) when receiving files. A remote attacker who controls the filesystem, can craft a file system that will transfer different file names and contents to the actual user;s filesystem layout, when copied with scp(1) in a configuration that caused utimes(2) to fail (e.g. under a SELinux policy or syscall sandbox).

Exploitation of this vulnerability may allow a malicious attacker to overwrite files on the client's system, however requires additional conditions to be met, such as utimes(2) failure.


Remediation

Install update from vendor's website.