OpenSSH < 4.3 scp Command Line Filename Processing Command Injection

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The version of SSH running on the remote host has a command injection

Description :

According to its banner, the version of OpenSSH running on the remote
host is potentially affected by an arbitrary command execution
vulnerability. The scp utility does not properly sanitize
user-supplied input prior to using a system() function call. A local
attacker could exploit this by creating filenames with shell
metacharacters, which could cause arbitrary code to be executed if
copied by a user running scp.

See also :

Solution :

Upgrade to OpenSSH 4.3 or later.

Risk factor :

Medium / CVSS Base Score : 4.6
CVSS Temporal Score : 4.6
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 44076 ()

Bugtraq ID: 16369

CVE ID: CVE-2006-0225

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now