OpenSSH < 4.3 scp Command Line Filename Processing Command Injection

This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.


Synopsis :

The version of SSH running on the remote host has a command injection
vulnerability.

Description :

According to its banner, the version of OpenSSH running on the remote
host is potentially affected by an arbitrary command execution
vulnerability. The scp utility does not properly sanitize
user-supplied input prior to using a system() function call. A local
attacker could exploit this by creating filenames with shell
metacharacters, which could cause arbitrary code to be executed if
copied by a user running scp.

See also :

https://bugzilla.mindrot.org/show_bug.cgi?id=1094
http://www.openssh.com/txt/release-4.3

Solution :

Upgrade to OpenSSH 4.3 or later.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.8
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 44076 ()

Bugtraq ID: 16369

CVE ID: CVE-2006-0225