Improper Input Validation Affecting openssh package, versions <1:8.3p1-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-OPENSSH-570886
- published 2 Jun 2020
- disclosed 1 Jun 2020
Introduced: 1 Jun 2020
CVE-2020-12062 Open this link in a new tabHow to fix?
Upgrade Debian:11
openssh
to version 1:8.3p1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssh
package and not the openssh
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.
References
- https://security-tracker.debian.org/tracker/CVE-2020-12062
- https://github.com/openssh/openssh-portable/commit/955854cafca88e0cdcd3d09ca1ad4ada465364a1
- https://github.com/openssh/openssh-portable/commit/aad87b88fc2536b1ea023213729aaf4eaabe1894
- https://www.openssh.com/txt/release-8.3
- https://www.openwall.com/lists/oss-security/2020/05/27/1